General
-
Target
4yQyNsXLvwdE7h0o12Rg.exe
-
Size
684KB
-
Sample
210204-ndk5cdacxs
-
MD5
5786034e260eabfd710772bcfa97bc95
-
SHA1
a5699e485d73471ecc45da327976aa6d2d2ac2cc
-
SHA256
1840872e8117b0efa252bc324ae2944d5c5b9242c928e3a568ccde06354eec35
-
SHA512
a4ce8ffb2e3d4d3104900ba68184d92cfe94f0e7cf4ee8834eec7838769e7e0775b964c09010b9f047c70012adb1850cefcb385c7a7f7c7ad735e7fa82c0f070
Static task
static1
Behavioral task
behavioral1
Sample
4yQyNsXLvwdE7h0o12Rg.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
4yQyNsXLvwdE7h0o12Rg.exe
Resource
win10v20201028
Malware Config
Targets
-
-
Target
4yQyNsXLvwdE7h0o12Rg.exe
-
Size
684KB
-
MD5
5786034e260eabfd710772bcfa97bc95
-
SHA1
a5699e485d73471ecc45da327976aa6d2d2ac2cc
-
SHA256
1840872e8117b0efa252bc324ae2944d5c5b9242c928e3a568ccde06354eec35
-
SHA512
a4ce8ffb2e3d4d3104900ba68184d92cfe94f0e7cf4ee8834eec7838769e7e0775b964c09010b9f047c70012adb1850cefcb385c7a7f7c7ad735e7fa82c0f070
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-