General
-
Target
08bacdfde872a4afdb1f470af017f4cb.exe
-
Size
1.4MB
-
Sample
221001-zxqyzsfed4
-
MD5
08bacdfde872a4afdb1f470af017f4cb
-
SHA1
2d04400160d3c9a1ca5f6b4a803705c4ec4f1d76
-
SHA256
cc08d0d79a8a1891a62277e8b0397e4265118e7d5c37b70027df4e1eee50df20
-
SHA512
9e65d5e86767215d24f16d1824f4eda5264cbb4f1637d4ab089e84566419ba0551890ca5133ca5bd64210a0cf826f70fba4e5ec102ac2051893e324fe0091bcb
-
SSDEEP
24576:6AVUVRIFhVX0+ErpP2Y2JemsF7ggPdskmLHLf+smkm0vS9l6SD4fwdqU:dVUVRIFDXhApOJgGgrg+emCal0fJ
Behavioral task
behavioral1
Sample
08bacdfde872a4afdb1f470af017f4cb.exe
Resource
win7-20220812-en
Malware Config
Targets
-
-
Target
08bacdfde872a4afdb1f470af017f4cb.exe
-
Size
1.4MB
-
MD5
08bacdfde872a4afdb1f470af017f4cb
-
SHA1
2d04400160d3c9a1ca5f6b4a803705c4ec4f1d76
-
SHA256
cc08d0d79a8a1891a62277e8b0397e4265118e7d5c37b70027df4e1eee50df20
-
SHA512
9e65d5e86767215d24f16d1824f4eda5264cbb4f1637d4ab089e84566419ba0551890ca5133ca5bd64210a0cf826f70fba4e5ec102ac2051893e324fe0091bcb
-
SSDEEP
24576:6AVUVRIFhVX0+ErpP2Y2JemsF7ggPdskmLHLf+smkm0vS9l6SD4fwdqU:dVUVRIFDXhApOJgGgrg+emCal0fJ
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops file in System32 directory
-