General
-
Target
5995290af2671af6d3f68e8c0f216d7d.exe
-
Size
1.4MB
-
Sample
230119-dplhmsaf9t
-
MD5
5995290af2671af6d3f68e8c0f216d7d
-
SHA1
50a641c1d0891da6bffab0cceb3d9ce3bd3fe463
-
SHA256
2f772b90d4eafa994cde8267f0711195f3e4bc961b17a37762aa2d09e8c49298
-
SHA512
6e002140d65174872197fff108b8b55359cb32fb3dd2231698563fe65cf221de0391ba1a15bb61b4c9a184b6edb86a33c689b2147cb21bf5bb14b72649d22e17
-
SSDEEP
24576:xP6Fxxjnp6ZPZzU3ubHzk7h8YRu86qvIyic5rfMOVjPTC836ukF3WGo2UlCCPv31:xCFxuZ5MhJRZ6AIAMOJbC8K0GalCCPPl
Behavioral task
behavioral1
Sample
5995290af2671af6d3f68e8c0f216d7d.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
5995290af2671af6d3f68e8c0f216d7d.exe
Resource
win10v2004-20221111-en
Malware Config
Targets
-
-
Target
5995290af2671af6d3f68e8c0f216d7d.exe
-
Size
1.4MB
-
MD5
5995290af2671af6d3f68e8c0f216d7d
-
SHA1
50a641c1d0891da6bffab0cceb3d9ce3bd3fe463
-
SHA256
2f772b90d4eafa994cde8267f0711195f3e4bc961b17a37762aa2d09e8c49298
-
SHA512
6e002140d65174872197fff108b8b55359cb32fb3dd2231698563fe65cf221de0391ba1a15bb61b4c9a184b6edb86a33c689b2147cb21bf5bb14b72649d22e17
-
SSDEEP
24576:xP6Fxxjnp6ZPZzU3ubHzk7h8YRu86qvIyic5rfMOVjPTC836ukF3WGo2UlCCPv31:xCFxuZ5MhJRZ6AIAMOJbC8K0GalCCPPl
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-