General
-
Target
00009e23a8bcbb7323c15448165dc6cc.exe
-
Size
2.3MB
-
Sample
230126-3v5k5sfh37
-
MD5
00009e23a8bcbb7323c15448165dc6cc
-
SHA1
2b5050619a50c63d487ed07651be88d1a8ab92d6
-
SHA256
bceca4720a9dfb62bf4f5130f9443e6fe40f24fb440df17a51b29340575805c0
-
SHA512
e5f88177c022f80bef16a225679211484f8b12a6f7fdf41c9b94a7a6604578ab413d8a9020231bb55f54a4233c912a7d10837207fce69ce157f4da8717878a41
-
SSDEEP
49152:oEAW6oV1uWgMzCAKcNqGAonnXvjGt8YxKIh3i2L:LADWgmNqGAKKBli
Behavioral task
behavioral1
Sample
00009e23a8bcbb7323c15448165dc6cc.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
00009e23a8bcbb7323c15448165dc6cc.exe
Resource
win10v2004-20221111-en
Malware Config
Targets
-
-
Target
00009e23a8bcbb7323c15448165dc6cc.exe
-
Size
2.3MB
-
MD5
00009e23a8bcbb7323c15448165dc6cc
-
SHA1
2b5050619a50c63d487ed07651be88d1a8ab92d6
-
SHA256
bceca4720a9dfb62bf4f5130f9443e6fe40f24fb440df17a51b29340575805c0
-
SHA512
e5f88177c022f80bef16a225679211484f8b12a6f7fdf41c9b94a7a6604578ab413d8a9020231bb55f54a4233c912a7d10837207fce69ce157f4da8717878a41
-
SSDEEP
49152:oEAW6oV1uWgMzCAKcNqGAonnXvjGt8YxKIh3i2L:LADWgmNqGAKKBli
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-