General
-
Target
8282EA0066E14F2E7CAF51B7A7D50DC1.exe
-
Size
1.0MB
-
Sample
210615-tarexz32ax
-
MD5
8282ea0066e14f2e7caf51b7a7d50dc1
-
SHA1
83c03517bb11c4ef01ced0b8df76cb35acbf4fdd
-
SHA256
db57de1bf0b133303c2325117a527f1586e4bf6af56219391a17095efb09cc76
-
SHA512
b48e2b9c226f57c50b5e58d716a906e9753f254136697e3e32c5f6aba2c6cc0a3175b0b290630949ddb4229a8eda53e5b62d03c969f5ef187963302ecc9e6841
Static task
static1
Behavioral task
behavioral1
Sample
8282EA0066E14F2E7CAF51B7A7D50DC1.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
8282EA0066E14F2E7CAF51B7A7D50DC1.exe
Resource
win10v20210408
Malware Config
Targets
-
-
Target
8282EA0066E14F2E7CAF51B7A7D50DC1.exe
-
Size
1.0MB
-
MD5
8282ea0066e14f2e7caf51b7a7d50dc1
-
SHA1
83c03517bb11c4ef01ced0b8df76cb35acbf4fdd
-
SHA256
db57de1bf0b133303c2325117a527f1586e4bf6af56219391a17095efb09cc76
-
SHA512
b48e2b9c226f57c50b5e58d716a906e9753f254136697e3e32c5f6aba2c6cc0a3175b0b290630949ddb4229a8eda53e5b62d03c969f5ef187963302ecc9e6841
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-