General
-
Target
61773A90F423B201DE01D5F0C5B65E0D8B5190EA644A7.exe
-
Size
1.7MB
-
Sample
230117-j29nwscg48
-
MD5
9e0df7cd4cb3336240e848118ee47443
-
SHA1
be19b241c865a6fb2e09599fac8ad585313ea317
-
SHA256
61773a90f423b201de01d5f0c5b65e0d8b5190ea644a742aeb479295fcd9a1f4
-
SHA512
dcd6ee3ab2bac09d5468ff68857685718586303e4ed50648278e8d6a6951b5758314f11c9703dbf14e56f209e7208db35cbe82f7b33990c995f29f09c40ecc8f
-
SSDEEP
24576:h2G/nvxW3WJ0WRkbHM7APWugRVc9oMdAuMthFKhvMV9bNGhTSN54s:hbA3L9HM70PgR1HAUlASD
Behavioral task
behavioral1
Sample
61773A90F423B201DE01D5F0C5B65E0D8B5190EA644A7.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
61773A90F423B201DE01D5F0C5B65E0D8B5190EA644A7.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
61773A90F423B201DE01D5F0C5B65E0D8B5190EA644A7.exe
-
Size
1.7MB
-
MD5
9e0df7cd4cb3336240e848118ee47443
-
SHA1
be19b241c865a6fb2e09599fac8ad585313ea317
-
SHA256
61773a90f423b201de01d5f0c5b65e0d8b5190ea644a742aeb479295fcd9a1f4
-
SHA512
dcd6ee3ab2bac09d5468ff68857685718586303e4ed50648278e8d6a6951b5758314f11c9703dbf14e56f209e7208db35cbe82f7b33990c995f29f09c40ecc8f
-
SSDEEP
24576:h2G/nvxW3WJ0WRkbHM7APWugRVc9oMdAuMthFKhvMV9bNGhTSN54s:hbA3L9HM70PgR1HAUlASD
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-