General
-
Target
b603fa0ae1a7fb223f51611ef3fea6370fec772dfd8a24769d76133728e987ee
-
Size
1.3MB
-
Sample
230203-n8c1qaaf2x
-
MD5
b07c30e58acd7e761dd31fd4f420abbf
-
SHA1
8c37ca32336fd642631a55b55898c5403752dffc
-
SHA256
b603fa0ae1a7fb223f51611ef3fea6370fec772dfd8a24769d76133728e987ee
-
SHA512
ba53afa61ebdcd0c19250ec1de355ddc2ced93a3bdfb933341403d5359d9b74de38baa1d46495f15635620019d71064a5ed0927bf54432e8a641a432321c2910
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
b603fa0ae1a7fb223f51611ef3fea6370fec772dfd8a24769d76133728e987ee.exe
Resource
win10v2004-20221111-en
Malware Config
Targets
-
-
Target
b603fa0ae1a7fb223f51611ef3fea6370fec772dfd8a24769d76133728e987ee
-
Size
1.3MB
-
MD5
b07c30e58acd7e761dd31fd4f420abbf
-
SHA1
8c37ca32336fd642631a55b55898c5403752dffc
-
SHA256
b603fa0ae1a7fb223f51611ef3fea6370fec772dfd8a24769d76133728e987ee
-
SHA512
ba53afa61ebdcd0c19250ec1de355ddc2ced93a3bdfb933341403d5359d9b74de38baa1d46495f15635620019d71064a5ed0927bf54432e8a641a432321c2910
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-