General
-
Target
a26ae5eb4e86ca54a1d338220318c43b.exe
-
Size
321KB
-
Sample
241030-g9zgsaycjm
-
MD5
a26ae5eb4e86ca54a1d338220318c43b
-
SHA1
ba66b537f8b7289acf611e67e1f3b20fb5bb48db
-
SHA256
fd687a05b13c4f87f139d043c4d9d936b73762d616204bfb090124fd163c316e
-
SHA512
0d2adc60f34f1d13be88df0034220e41a36f0a2dc8217fe1fc42714834f080c81f033d61f4f23af6c50c74d94d23a689714ef4c8824c96992fd478587cb31ccd
-
SSDEEP
6144:1RmCttlxSX8YOKPnzxx7YyRRYz4OjnYDh+OHYQmrBQ4rQbFZUzEo1V:vmJMYt/czYDh+OOQMQbT
Static task
static1
Behavioral task
behavioral1
Sample
a26ae5eb4e86ca54a1d338220318c43b.exe
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
a26ae5eb4e86ca54a1d338220318c43b.exe
-
Size
321KB
-
MD5
a26ae5eb4e86ca54a1d338220318c43b
-
SHA1
ba66b537f8b7289acf611e67e1f3b20fb5bb48db
-
SHA256
fd687a05b13c4f87f139d043c4d9d936b73762d616204bfb090124fd163c316e
-
SHA512
0d2adc60f34f1d13be88df0034220e41a36f0a2dc8217fe1fc42714834f080c81f033d61f4f23af6c50c74d94d23a689714ef4c8824c96992fd478587cb31ccd
-
SSDEEP
6144:1RmCttlxSX8YOKPnzxx7YyRRYz4OjnYDh+OHYQmrBQ4rQbFZUzEo1V:vmJMYt/czYDh+OOQMQbT
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-