General
-
Target
89edbc33244a1aa7c21adb3c863e652e4dc57185b552db7dab6eeac769e01dac
-
Size
1.3MB
-
Sample
230203-n3aneaae7y
-
MD5
a8facee77afa6a29cad437cdcdd9d59e
-
SHA1
8f72360e70bf0793d98377044b8d2549f81674ed
-
SHA256
89edbc33244a1aa7c21adb3c863e652e4dc57185b552db7dab6eeac769e01dac
-
SHA512
a91efd246cc26e811bbd284a08ab15b8217b9a4d8026e12ad2b085aeb7f9c205a189651c3f26aca811a4bdd7ca26c0525c69dd7a41a01823727239d8c543fe9d
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
89edbc33244a1aa7c21adb3c863e652e4dc57185b552db7dab6eeac769e01dac.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
89edbc33244a1aa7c21adb3c863e652e4dc57185b552db7dab6eeac769e01dac
-
Size
1.3MB
-
MD5
a8facee77afa6a29cad437cdcdd9d59e
-
SHA1
8f72360e70bf0793d98377044b8d2549f81674ed
-
SHA256
89edbc33244a1aa7c21adb3c863e652e4dc57185b552db7dab6eeac769e01dac
-
SHA512
a91efd246cc26e811bbd284a08ab15b8217b9a4d8026e12ad2b085aeb7f9c205a189651c3f26aca811a4bdd7ca26c0525c69dd7a41a01823727239d8c543fe9d
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-