General
-
Target
afb679b10d49b2052e1239c345dee646.exe
-
Size
3.0MB
-
Sample
230127-anb12ahc8y
-
MD5
afb679b10d49b2052e1239c345dee646
-
SHA1
5cc8ce5753431b0cc4901aa53d8489e37a91c672
-
SHA256
70e310463aea47e2121969f8a96000a72c44ce574e2786a0e4d5e472ce35f998
-
SHA512
14983d548e071cd85973739f6056a9ab9ca3392f8f1aa3054ec05cfccaafd00135bfa1cdfc83fad26e5adee35c8f5d2d470e296eaba3cee8d7f7e896d47fb967
-
SSDEEP
49152:hwQVR+A3rrXAafICZyKC5iEqpVJ2pfexGqjNJ8JrSwAca2R7TQALtMiTdUdvVSMt:hwQVP7x6iEgBxVr8lMfkT1DBUdvge9Gi
Behavioral task
behavioral1
Sample
afb679b10d49b2052e1239c345dee646.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
afb679b10d49b2052e1239c345dee646.exe
Resource
win10v2004-20220901-en
Malware Config
Targets
-
-
Target
afb679b10d49b2052e1239c345dee646.exe
-
Size
3.0MB
-
MD5
afb679b10d49b2052e1239c345dee646
-
SHA1
5cc8ce5753431b0cc4901aa53d8489e37a91c672
-
SHA256
70e310463aea47e2121969f8a96000a72c44ce574e2786a0e4d5e472ce35f998
-
SHA512
14983d548e071cd85973739f6056a9ab9ca3392f8f1aa3054ec05cfccaafd00135bfa1cdfc83fad26e5adee35c8f5d2d470e296eaba3cee8d7f7e896d47fb967
-
SSDEEP
49152:hwQVR+A3rrXAafICZyKC5iEqpVJ2pfexGqjNJ8JrSwAca2R7TQALtMiTdUdvVSMt:hwQVP7x6iEgBxVr8lMfkT1DBUdvge9Gi
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Modifies WinLogon for persistence
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-