General
-
Target
cwel.zip
-
Size
11.1MB
-
Sample
241220-p2pllswmey
-
MD5
2a9f3aa47c3089ab25f5755b659def4c
-
SHA1
31fec6624ab4ed412aad69fcaaa9e7ccef06abb9
-
SHA256
794c1b48e399a4ac173dcb4a6a619ad53cfa99f52b9685dc62d922dd879acb29
-
SHA512
0483b54ed252b5499aedf395f692a4ce884f15399b883499d66304ffa06564df8fd5bbfd48c6e52905f6d2fb3f686dcf4b0add1314181f0b80601c1f2e66558c
-
SSDEEP
196608:dPvlJIITPqNr34qtBFN2OtLI2YAKIcQKf7QVQKWXdk5SkqBkEZLT7oNulGOtsDvR:1vwIeNroqn82YAjcQsQvWXdk4kqBkEZA
Behavioral task
behavioral1
Sample
cwel.zip
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
cwel.zip
-
Size
11.1MB
-
MD5
2a9f3aa47c3089ab25f5755b659def4c
-
SHA1
31fec6624ab4ed412aad69fcaaa9e7ccef06abb9
-
SHA256
794c1b48e399a4ac173dcb4a6a619ad53cfa99f52b9685dc62d922dd879acb29
-
SHA512
0483b54ed252b5499aedf395f692a4ce884f15399b883499d66304ffa06564df8fd5bbfd48c6e52905f6d2fb3f686dcf4b0add1314181f0b80601c1f2e66558c
-
SSDEEP
196608:dPvlJIITPqNr34qtBFN2OtLI2YAKIcQKf7QVQKWXdk5SkqBkEZLT7oNulGOtsDvR:1vwIeNroqn82YAjcQsQvWXdk4kqBkEZA
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Disables Task Manager via registry modification
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-