General
-
Target
ba90ca00578e631e9456ebc62d5cf241efd23e554295c214e08b1f32c18d227a
-
Size
1.3MB
-
Sample
230203-metwpshf9s
-
MD5
9ee1e7e713310e6436c4a5343e623a29
-
SHA1
6a83fa048f1609ab2de9fee97ed8161a90012a8c
-
SHA256
ba90ca00578e631e9456ebc62d5cf241efd23e554295c214e08b1f32c18d227a
-
SHA512
0a8baeff68d6ef0fa6e904dcc57c26a2eae2d1d0df945caa13f2a7586923fc41ea3693ea388dfafa25aebc10c1f645c84d7fd7a377e71ac463edf66ac57a9c47
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
ba90ca00578e631e9456ebc62d5cf241efd23e554295c214e08b1f32c18d227a.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
ba90ca00578e631e9456ebc62d5cf241efd23e554295c214e08b1f32c18d227a
-
Size
1.3MB
-
MD5
9ee1e7e713310e6436c4a5343e623a29
-
SHA1
6a83fa048f1609ab2de9fee97ed8161a90012a8c
-
SHA256
ba90ca00578e631e9456ebc62d5cf241efd23e554295c214e08b1f32c18d227a
-
SHA512
0a8baeff68d6ef0fa6e904dcc57c26a2eae2d1d0df945caa13f2a7586923fc41ea3693ea388dfafa25aebc10c1f645c84d7fd7a377e71ac463edf66ac57a9c47
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-