General
-
Target
ceaea02e8e0b3830a756fc5a5f60e28cd2eb7626fc7ec88fc67478adb98be2a4
-
Size
315KB
-
Sample
230508-cp839sgf58
-
MD5
d3855e12436fa13461cb31f90bbb49de
-
SHA1
aede824b4aa017bc39a4df466cb3de26bfa34bc8
-
SHA256
ceaea02e8e0b3830a756fc5a5f60e28cd2eb7626fc7ec88fc67478adb98be2a4
-
SHA512
1f3521c449127cc6b14eaf3fdfc199be35b0206f9522dc65a588204b7694a18b9000d4c6dbfebf5ad4d923b750d74169cb71f9596860be096cec1d130f0f9c7c
-
SSDEEP
6144:GHFyN3U5hoSYEDtsUp0QiMKyIXF0tfaymknRvRo8//5SIbVVwCqy:GsNE5uotsCKyE09eknRvRoM5SuR
Behavioral task
behavioral1
Sample
ceaea02e8e0b3830a756fc5a5f60e28cd2eb7626fc7ec88fc67478adb98be2a4.exe
Resource
win10v2004-20230220-en
Malware Config
Targets
-
-
Target
ceaea02e8e0b3830a756fc5a5f60e28cd2eb7626fc7ec88fc67478adb98be2a4
-
Size
315KB
-
MD5
d3855e12436fa13461cb31f90bbb49de
-
SHA1
aede824b4aa017bc39a4df466cb3de26bfa34bc8
-
SHA256
ceaea02e8e0b3830a756fc5a5f60e28cd2eb7626fc7ec88fc67478adb98be2a4
-
SHA512
1f3521c449127cc6b14eaf3fdfc199be35b0206f9522dc65a588204b7694a18b9000d4c6dbfebf5ad4d923b750d74169cb71f9596860be096cec1d130f0f9c7c
-
SSDEEP
6144:GHFyN3U5hoSYEDtsUp0QiMKyIXF0tfaymknRvRo8//5SIbVVwCqy:GsNE5uotsCKyE09eknRvRoM5SuR
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-