General
-
Target
51c3cebd8c8fe19e37b68c64218b4c4552aac4c804bd04ed372fd74d52668ff0
-
Size
1.5MB
-
Sample
221212-2js8asfh3t
-
MD5
2bd60604768e532058d654c607ded159
-
SHA1
7777ccc162b1ab55eda5c22b109c5ebc91f0b469
-
SHA256
b95be0f98df652640e019ce8bc06dc4999399305834f1b75e981dd7c5a1c0423
-
SHA512
86ff9828acf99fbf631cde3cde9f63e20fd741d3b95f401239408131eaf711e4223a38fb12a74504292a43179f50b854e86bea17c7431342d658177479326166
-
SSDEEP
24576:wpbJdN/DEf2d6cXL83+ogefj2fPPCAIPiyRscPl2g4CkPo6rugwdD2bM:EVAfKbXL83+UjIqF6yRsct9ibrzSD24
Behavioral task
behavioral1
Sample
51c3cebd8c8fe19e37b68c64218b4c4552aac4c804bd04ed372fd74d52668ff0.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
51c3cebd8c8fe19e37b68c64218b4c4552aac4c804bd04ed372fd74d52668ff0.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
51c3cebd8c8fe19e37b68c64218b4c4552aac4c804bd04ed372fd74d52668ff0
-
Size
2.0MB
-
MD5
fc9ea28a3c3659c4200e442d20198458
-
SHA1
79ede873cd08d5941e54524dd85b5add0a79bd7c
-
SHA256
51c3cebd8c8fe19e37b68c64218b4c4552aac4c804bd04ed372fd74d52668ff0
-
SHA512
c2357a0eb6fd31929af57c544be2de14b0daee2a731ec09e586b0ac748b7368ae5a022d0d8dae0ccece0fa860799a0da02405f60d86a963e177508b5e4220a17
-
SSDEEP
49152:ubA3jVKbYcU6bWUfj4a7syRO2tzK/RNS/2t:ubjJXj4a4IKJYet
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Drops file in Drivers directory
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-