General
-
Target
09f3ea83868d661776bb6231c214c397.exe
-
Size
2.5MB
-
Sample
230119-d2216aeb35
-
MD5
09f3ea83868d661776bb6231c214c397
-
SHA1
b56d6ebad45ccf765087c4c1666a37dc860da268
-
SHA256
3a9d578bed5193425becda7f50fdda6b1a131ba35195ae58ac24a2069e967b03
-
SHA512
48893b7efd2e92fb30956d680706f5877dd635d081aa546a2b73960f0e3aaf0ab381fc8f386a01a87fde22eece21157dd439810e5d714ecf4a64646a828eb912
-
SSDEEP
49152:CSg8kOqBMdDhtQM4I+MkmJm9LcBwQYdXQ4J:dfkOqGhhtn9+nmJm9LcBCXvJ
Behavioral task
behavioral1
Sample
09f3ea83868d661776bb6231c214c397.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
09f3ea83868d661776bb6231c214c397.exe
Resource
win10v2004-20220901-en
Malware Config
Targets
-
-
Target
09f3ea83868d661776bb6231c214c397.exe
-
Size
2.5MB
-
MD5
09f3ea83868d661776bb6231c214c397
-
SHA1
b56d6ebad45ccf765087c4c1666a37dc860da268
-
SHA256
3a9d578bed5193425becda7f50fdda6b1a131ba35195ae58ac24a2069e967b03
-
SHA512
48893b7efd2e92fb30956d680706f5877dd635d081aa546a2b73960f0e3aaf0ab381fc8f386a01a87fde22eece21157dd439810e5d714ecf4a64646a828eb912
-
SSDEEP
49152:CSg8kOqBMdDhtQM4I+MkmJm9LcBwQYdXQ4J:dfkOqGhhtn9+nmJm9LcBCXvJ
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Modifies WinLogon for persistence
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-