General
-
Target
4b85168bf2297cd4243a987754257fbaebaf409fb04f3fd31f1c6f18c6f98398
-
Size
1.1MB
-
Sample
230122-r6blnaab3x
-
MD5
d1a51393448d979468bee767ff7b1346
-
SHA1
f7725410f3ca157cfa51eeee0d1e74ff247a5e29
-
SHA256
4b85168bf2297cd4243a987754257fbaebaf409fb04f3fd31f1c6f18c6f98398
-
SHA512
f828d72e5d7a8b1bee1b93ef2d8217eec05592c0909599d63b15112791f0db89db021c25b21ace64cf8fa678f115a088e9bee35bb8c89fbdd613463262861602
-
SSDEEP
24576:U2G/nvxW3Ww0tEdrbS1zU+z9ujMu9uU4RPDbAIA:UbA30UXSvzP0p
Behavioral task
behavioral1
Sample
4b85168bf2297cd4243a987754257fbaebaf409fb04f3fd31f1c6f18c6f98398.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
4b85168bf2297cd4243a987754257fbaebaf409fb04f3fd31f1c6f18c6f98398
-
Size
1.1MB
-
MD5
d1a51393448d979468bee767ff7b1346
-
SHA1
f7725410f3ca157cfa51eeee0d1e74ff247a5e29
-
SHA256
4b85168bf2297cd4243a987754257fbaebaf409fb04f3fd31f1c6f18c6f98398
-
SHA512
f828d72e5d7a8b1bee1b93ef2d8217eec05592c0909599d63b15112791f0db89db021c25b21ace64cf8fa678f115a088e9bee35bb8c89fbdd613463262861602
-
SSDEEP
24576:U2G/nvxW3Ww0tEdrbS1zU+z9ujMu9uU4RPDbAIA:UbA30UXSvzP0p
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Disables Task Manager via registry modification
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-