General
-
Target
36d335dac984a522421bc91964725fb2.exe
-
Size
965KB
-
Sample
220916-anb12aech7
-
MD5
36d335dac984a522421bc91964725fb2
-
SHA1
5cefbce23c88328fe51590e9c7d6a0e34c05e941
-
SHA256
c32d9f3e68923d40027dad0bb525795d5aa605b039e5b480a7d713c6b8d44594
-
SHA512
406d731e9fd18d424d486580a90bb0d9480fbc0fb477019b2563d05f4f36188ef64be8d39a62dd25b11f9bf4192a4d1a833158c24f42c6ba4598c4101cdba3d5
-
SSDEEP
12288:2K5wpf3kJ7CZIgNw9DAlnZcUUNHuZdYD1cDN+jQ5x+lbbAKLCwzgMl+Vp:55wp/0CZwDAlnvPa1fjmKbbj+I0
Behavioral task
behavioral1
Sample
36d335dac984a522421bc91964725fb2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
36d335dac984a522421bc91964725fb2.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
36d335dac984a522421bc91964725fb2.exe
-
Size
965KB
-
MD5
36d335dac984a522421bc91964725fb2
-
SHA1
5cefbce23c88328fe51590e9c7d6a0e34c05e941
-
SHA256
c32d9f3e68923d40027dad0bb525795d5aa605b039e5b480a7d713c6b8d44594
-
SHA512
406d731e9fd18d424d486580a90bb0d9480fbc0fb477019b2563d05f4f36188ef64be8d39a62dd25b11f9bf4192a4d1a833158c24f42c6ba4598c4101cdba3d5
-
SSDEEP
12288:2K5wpf3kJ7CZIgNw9DAlnZcUUNHuZdYD1cDN+jQ5x+lbbAKLCwzgMl+Vp:55wp/0CZwDAlnvPa1fjmKbbj+I0
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-