General
-
Target
7E649C9E6325C46601A81FD6C0DBF36EE6C85D0EE108C.exe
-
Size
1.9MB
-
Sample
230119-dsgc4adg89
-
MD5
3b15c55bae9fefd6585e43490f6bf231
-
SHA1
3e1815ec0f2fcc83c1aef7173baf749e4547f967
-
SHA256
7e649c9e6325c46601a81fd6c0dbf36ee6c85d0ee108c333b283140f96b842f6
-
SHA512
43b870f7feaf9b1290acd23f17d0b22ea678ef93f52b5d89e11f85dc87c6306e3fd45e151784001f502d2261f153737a82578a31cfdf1edd93f8b31d6a86b4bc
-
SSDEEP
49152:Mb3eYn9rEj80t2CttDha8bCgXLQHkfX68lSurk9JWBKM:MlnmwWttPbC+R68l89r
Static task
static1
Behavioral task
behavioral1
Sample
7E649C9E6325C46601A81FD6C0DBF36EE6C85D0EE108C.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7E649C9E6325C46601A81FD6C0DBF36EE6C85D0EE108C.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
7E649C9E6325C46601A81FD6C0DBF36EE6C85D0EE108C.exe
-
Size
1.9MB
-
MD5
3b15c55bae9fefd6585e43490f6bf231
-
SHA1
3e1815ec0f2fcc83c1aef7173baf749e4547f967
-
SHA256
7e649c9e6325c46601a81fd6c0dbf36ee6c85d0ee108c333b283140f96b842f6
-
SHA512
43b870f7feaf9b1290acd23f17d0b22ea678ef93f52b5d89e11f85dc87c6306e3fd45e151784001f502d2261f153737a82578a31cfdf1edd93f8b31d6a86b4bc
-
SSDEEP
49152:Mb3eYn9rEj80t2CttDha8bCgXLQHkfX68lSurk9JWBKM:MlnmwWttPbC+R68l89r
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Modifies WinLogon for persistence
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-