General
-
Target
b313d25c0fed1c6069e6a72e73a5751f.exe
-
Size
1.2MB
-
Sample
230126-2fcq5sha6t
-
MD5
b313d25c0fed1c6069e6a72e73a5751f
-
SHA1
1717db41053d68f4b6cb0619eaee7d7617a6ebc9
-
SHA256
01e2946bab81b880ec494a1692a791ced92624246e6aed7a15c725851ede71dd
-
SHA512
6807bc163b386f0398a7195f83f7b0619d912724582780ace94d0cd115c2f192a90536f9950cf61c9f18d7df0da58ea9116a22544ff9f3a5489e6c2398d975d3
-
SSDEEP
24576:1oz7PdSo8OhfvG83PxEXY5TZ95f+bYy4HKTtadCK2yseqa+B:1odSo80/GXC9+bl4ewpEe+
Behavioral task
behavioral1
Sample
b313d25c0fed1c6069e6a72e73a5751f.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b313d25c0fed1c6069e6a72e73a5751f.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
b313d25c0fed1c6069e6a72e73a5751f.exe
-
Size
1.2MB
-
MD5
b313d25c0fed1c6069e6a72e73a5751f
-
SHA1
1717db41053d68f4b6cb0619eaee7d7617a6ebc9
-
SHA256
01e2946bab81b880ec494a1692a791ced92624246e6aed7a15c725851ede71dd
-
SHA512
6807bc163b386f0398a7195f83f7b0619d912724582780ace94d0cd115c2f192a90536f9950cf61c9f18d7df0da58ea9116a22544ff9f3a5489e6c2398d975d3
-
SSDEEP
24576:1oz7PdSo8OhfvG83PxEXY5TZ95f+bYy4HKTtadCK2yseqa+B:1odSo80/GXC9+bl4ewpEe+
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-