General
-
Target
cb54fe9938168c64ee9dbdc0982a9917.exe
-
Size
1.1MB
-
Sample
221007-xlbzksdddr
-
MD5
cb54fe9938168c64ee9dbdc0982a9917
-
SHA1
9b9e8e726a5b85e4e5dd1393f6d7492715ff51e5
-
SHA256
08b960976b9ab83018f62874758a07d07031182b60a682141bce7599e34e5981
-
SHA512
170c95d305a9e4a0fb855d2f84cd501551eaa6424a5a56110c4e10f092278833df670ea0cb3f8362263ebf56e513aa1bcc662dab7e616849bf876e512fcbf28f
-
SSDEEP
12288:qDNE5BggCqq44nBH9IB5SxyU6UD7/MoAhxEkNiwZG7Tn5jnv/7uTi3X1enGQtxRH:qDNb/JBH9e7mEhxFfGnNa/RABVKIDNG
Behavioral task
behavioral1
Sample
cb54fe9938168c64ee9dbdc0982a9917.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
cb54fe9938168c64ee9dbdc0982a9917.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
cb54fe9938168c64ee9dbdc0982a9917.exe
-
Size
1.1MB
-
MD5
cb54fe9938168c64ee9dbdc0982a9917
-
SHA1
9b9e8e726a5b85e4e5dd1393f6d7492715ff51e5
-
SHA256
08b960976b9ab83018f62874758a07d07031182b60a682141bce7599e34e5981
-
SHA512
170c95d305a9e4a0fb855d2f84cd501551eaa6424a5a56110c4e10f092278833df670ea0cb3f8362263ebf56e513aa1bcc662dab7e616849bf876e512fcbf28f
-
SSDEEP
12288:qDNE5BggCqq44nBH9IB5SxyU6UD7/MoAhxEkNiwZG7Tn5jnv/7uTi3X1enGQtxRH:qDNb/JBH9e7mEhxFfGnNa/RABVKIDNG
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Modifies WinLogon for persistence
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-