General
-
Target
3d1551fcb92caa336745b275ea357187.exe
-
Size
2.7MB
-
Sample
220924-f1z7aaafa7
-
MD5
3d1551fcb92caa336745b275ea357187
-
SHA1
38b8fe4cee22237d34cf27974edd82d1105c6bac
-
SHA256
946714fa944cab2d100b25b5ce8dc8ae20d1d9a27c3e9c67ee2cd18d862d03af
-
SHA512
b4d40905d2115ebc614b0b11a15f8b740040b4bebcc973e7d44dbddc58c6034f854e201b870c538f575c45b14935b2bde8e4ba58eb9043098788660ed2b35f0a
-
SSDEEP
49152:BBZnUTbk3+q5cyOycEFE/7mdpDsDCtlToe7AhexA7s6Sjaw3mQf:BBZnUe+q5cyONzopoWt9oezxq83
Static task
static1
Behavioral task
behavioral1
Sample
3d1551fcb92caa336745b275ea357187.exe
Resource
win7-20220812-en
Malware Config
Extracted
colibri
1.2.0
Build1
http://zpltcmgodhvvedxtfcygvbgjkvgvcguygytfigj.cc/gate.php
http://yugyuvyugguitgyuigtfyutdtoghghbbgyv.cx/gate.php
Targets
-
-
Target
3d1551fcb92caa336745b275ea357187.exe
-
Size
2.7MB
-
MD5
3d1551fcb92caa336745b275ea357187
-
SHA1
38b8fe4cee22237d34cf27974edd82d1105c6bac
-
SHA256
946714fa944cab2d100b25b5ce8dc8ae20d1d9a27c3e9c67ee2cd18d862d03af
-
SHA512
b4d40905d2115ebc614b0b11a15f8b740040b4bebcc973e7d44dbddc58c6034f854e201b870c538f575c45b14935b2bde8e4ba58eb9043098788660ed2b35f0a
-
SSDEEP
49152:BBZnUTbk3+q5cyOycEFE/7mdpDsDCtlToe7AhexA7s6Sjaw3mQf:BBZnUe+q5cyONzopoWt9oezxq83
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-