General
-
Target
b808c2e54855ce9891e94d7e4b61ddd52d140bb405d31a1c4d21e8cff6d61747
-
Size
1.3MB
-
Sample
230203-mzn6ysaa5t
-
MD5
e26cffa09810e3f9e4af484ed96e4728
-
SHA1
9bc7d37a480cbc0847c307d95318826c121a93a2
-
SHA256
b808c2e54855ce9891e94d7e4b61ddd52d140bb405d31a1c4d21e8cff6d61747
-
SHA512
3288a16c9ed087628bb8edc71fbfa6713bd67659f34dd0604af63f4370edf9288be7ae80f29142a4644e0d241e721682df2a6717ac8af4119350457160fdf819
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
b808c2e54855ce9891e94d7e4b61ddd52d140bb405d31a1c4d21e8cff6d61747.exe
Resource
win10v2004-20220901-en
Malware Config
Targets
-
-
Target
b808c2e54855ce9891e94d7e4b61ddd52d140bb405d31a1c4d21e8cff6d61747
-
Size
1.3MB
-
MD5
e26cffa09810e3f9e4af484ed96e4728
-
SHA1
9bc7d37a480cbc0847c307d95318826c121a93a2
-
SHA256
b808c2e54855ce9891e94d7e4b61ddd52d140bb405d31a1c4d21e8cff6d61747
-
SHA512
3288a16c9ed087628bb8edc71fbfa6713bd67659f34dd0604af63f4370edf9288be7ae80f29142a4644e0d241e721682df2a6717ac8af4119350457160fdf819
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-