General
-
Target
e9a5b47b26990737c8f764074805cf7e10834fd21d49b8b1f99afd94182b0cf0
-
Size
1.3MB
-
Sample
230203-nflr6aac7z
-
MD5
6f5aec74b16e21f0c94599aa457f72c7
-
SHA1
50f1ddf5d5d6eada2e39a45891e9dbb88c338533
-
SHA256
e9a5b47b26990737c8f764074805cf7e10834fd21d49b8b1f99afd94182b0cf0
-
SHA512
83d59391115fb976b769b402ad483a351f4229f94d36cf51b0e2cfb9366f882761af624d368e929bebe1162bb58b9f4311a794b07ffdeef470e7d3c6a500d42f
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
e9a5b47b26990737c8f764074805cf7e10834fd21d49b8b1f99afd94182b0cf0.exe
Resource
win10-20220812-en
Malware Config
Targets
-
-
Target
e9a5b47b26990737c8f764074805cf7e10834fd21d49b8b1f99afd94182b0cf0
-
Size
1.3MB
-
MD5
6f5aec74b16e21f0c94599aa457f72c7
-
SHA1
50f1ddf5d5d6eada2e39a45891e9dbb88c338533
-
SHA256
e9a5b47b26990737c8f764074805cf7e10834fd21d49b8b1f99afd94182b0cf0
-
SHA512
83d59391115fb976b769b402ad483a351f4229f94d36cf51b0e2cfb9366f882761af624d368e929bebe1162bb58b9f4311a794b07ffdeef470e7d3c6a500d42f
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-