General
-
Target
test.exe
-
Size
1.1MB
-
Sample
250201-qp978atnhv
-
MD5
311fecbbbd923a898bad691c92b6d973
-
SHA1
3adef01dc440eca910d317da3a990bd9a0f6d0b3
-
SHA256
15a42baf95ff65841b24c11950edc8c792b29d5a47ffd69290515a8a56066937
-
SHA512
4ba3775c90adfc71f2f314f3d545e520a13cee81495304cea98d079d347c3a8b9d33483f964a3d7aa437936437a938529f7817b8a69a8d4ddc5d978885d143c1
-
SSDEEP
12288:aRZ+IoG/n9IQxW3OBsee2X+t4RbCqDn2Bx2cpjvzsX6a4X6594tCPjp42nIlf4Qg:U2G/nvxW3Ww0tCdx2cpjv64X6trn3nF
Behavioral task
behavioral1
Sample
test.exe
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
test.exe
-
Size
1.1MB
-
MD5
311fecbbbd923a898bad691c92b6d973
-
SHA1
3adef01dc440eca910d317da3a990bd9a0f6d0b3
-
SHA256
15a42baf95ff65841b24c11950edc8c792b29d5a47ffd69290515a8a56066937
-
SHA512
4ba3775c90adfc71f2f314f3d545e520a13cee81495304cea98d079d347c3a8b9d33483f964a3d7aa437936437a938529f7817b8a69a8d4ddc5d978885d143c1
-
SSDEEP
12288:aRZ+IoG/n9IQxW3OBsee2X+t4RbCqDn2Bx2cpjvzsX6a4X6594tCPjp42nIlf4Qg:U2G/nvxW3Ww0tCdx2cpjv64X6trn3nF
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-