General
-
Target
a89375051c78e7e567cf4ef2d349d8d3.exe
-
Size
1.1MB
-
Sample
230808-xhgqnagh5w
-
MD5
a89375051c78e7e567cf4ef2d349d8d3
-
SHA1
b83f1fda831481344fae26a7ce92740d38b38e54
-
SHA256
679bf1ece5d0a3592e49f135d5bedcc5748565a1c4d05b785017f0c53e2d0eca
-
SHA512
c6310e3af3e48b42f8f60dc7d401f20408d3b3687add5e9991d88a3f00cab5c59d11861a2cfbf5d5472655e0eb89afc671da919082b0a825cc7f70caf2166712
-
SSDEEP
24576:qADdteLS1VO6wLVqq0aJSw69voIN7y7Di0:sE86MVX/SwHmf
Behavioral task
behavioral1
Sample
a89375051c78e7e567cf4ef2d349d8d3.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
a89375051c78e7e567cf4ef2d349d8d3.exe
Resource
win10v2004-20230703-en
Malware Config
Targets
-
-
Target
a89375051c78e7e567cf4ef2d349d8d3.exe
-
Size
1.1MB
-
MD5
a89375051c78e7e567cf4ef2d349d8d3
-
SHA1
b83f1fda831481344fae26a7ce92740d38b38e54
-
SHA256
679bf1ece5d0a3592e49f135d5bedcc5748565a1c4d05b785017f0c53e2d0eca
-
SHA512
c6310e3af3e48b42f8f60dc7d401f20408d3b3687add5e9991d88a3f00cab5c59d11861a2cfbf5d5472655e0eb89afc671da919082b0a825cc7f70caf2166712
-
SSDEEP
24576:qADdteLS1VO6wLVqq0aJSw69voIN7y7Di0:sE86MVX/SwHmf
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-