General
-
Target
tmp
-
Size
1.4MB
-
Sample
221021-fk849acgeq
-
MD5
93b1b73283a7f2fc2ed2c03a7a6eb1cc
-
SHA1
46ea510204654f88c813b580af24860085f4bafc
-
SHA256
ece5d984948d86af69547410313ff98743d52586a649ac7d132900a27864432a
-
SHA512
6ce5e38149d0ba4c6c399d1ce8064762952ba703901047839419f413fa3cb3605f466b3bb879aca179dae41108949a182a0609e9843564659ff5bf9002af4645
-
SSDEEP
24576:u2G/nvxW3WieC1Ab5W7eGoXKQZc+J/E11cCdbVkTQD33:ubA3jOb5WTeZc+5CdbV8QDn
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20220901-en
Malware Config
Targets
-
-
Target
tmp
-
Size
1.4MB
-
MD5
93b1b73283a7f2fc2ed2c03a7a6eb1cc
-
SHA1
46ea510204654f88c813b580af24860085f4bafc
-
SHA256
ece5d984948d86af69547410313ff98743d52586a649ac7d132900a27864432a
-
SHA512
6ce5e38149d0ba4c6c399d1ce8064762952ba703901047839419f413fa3cb3605f466b3bb879aca179dae41108949a182a0609e9843564659ff5bf9002af4645
-
SSDEEP
24576:u2G/nvxW3WieC1Ab5W7eGoXKQZc+J/E11cCdbVkTQD33:ubA3jOb5WTeZc+5CdbV8QDn
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Disables Task Manager via registry modification
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-