General
-
Target
13f0462af330f984e6bf4f78ca0fd568.exe
-
Size
4.9MB
-
Sample
221014-xsmdwsecak
-
MD5
13f0462af330f984e6bf4f78ca0fd568
-
SHA1
d4cade4a691d79c8edb40a02036dda11190e4795
-
SHA256
98a6de25f542afaee3621feaf905566e3a5f60c99c5e1c051de2046cd803fb06
-
SHA512
f04865953da22dd552373cb1a6e027ed2adbe87ad8f3fdbf59145d70fbc6de1310451824f45cc613400b14a4fe333ffe8cb8bdf65407badbcc4a9b76769a8ea8
-
SSDEEP
49152:jl5MTGChZpxtlBBgxchXb/zqP6DUtRgs5q289dAnSz44hnW1XgnYu6fYmPkMSx8E:
Static task
static1
Behavioral task
behavioral1
Sample
13f0462af330f984e6bf4f78ca0fd568.exe
Resource
win7-20220812-en
Malware Config
Extracted
colibri
1.2.0
Build1
http://zpltcmgodhvvedxtfcygvbgjkvgvcguygytfigj.cc/gate.php
http://yugyuvyugguitgyuigtfyutdtoghghbbgyv.cx/gate.php
Targets
-
-
Target
13f0462af330f984e6bf4f78ca0fd568.exe
-
Size
4.9MB
-
MD5
13f0462af330f984e6bf4f78ca0fd568
-
SHA1
d4cade4a691d79c8edb40a02036dda11190e4795
-
SHA256
98a6de25f542afaee3621feaf905566e3a5f60c99c5e1c051de2046cd803fb06
-
SHA512
f04865953da22dd552373cb1a6e027ed2adbe87ad8f3fdbf59145d70fbc6de1310451824f45cc613400b14a4fe333ffe8cb8bdf65407badbcc4a9b76769a8ea8
-
SSDEEP
49152:jl5MTGChZpxtlBBgxchXb/zqP6DUtRgs5q289dAnSz44hnW1XgnYu6fYmPkMSx8E:
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-