General
-
Target
Ou6mS40OHrkbwQiM7ccaR.exe
-
Size
2.4MB
-
Sample
230127-d2nhrsgc78
-
MD5
4ceeb0d068653ada01e702ba61dfdb7f
-
SHA1
0e09a416c381e657f39af975f259d09da0324300
-
SHA256
bfe4b2b5b1b9c2e8253848be27b277f1daf99314ff0ac964dc595bdef841a6c3
-
SHA512
798904e3ef1ef5f898185577c2dc15dd8872f4e70f638f8f94f90846ac11eecbad72d843406512863d58a882df8ad40c02ad2d9daa6289f3c46fff724f5f1b73
-
SSDEEP
24576:1RNpngHRc5DYZYLUsZ9p48N41XMFBDeQzC/tqELdO0U7TBd1X/SQOvjASm:PPDvx94V0eQuPdmJdV/J
Behavioral task
behavioral1
Sample
Ou6mS40OHrkbwQiM7ccaR.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
Ou6mS40OHrkbwQiM7ccaR.exe
Resource
win10v2004-20220901-en
Malware Config
Targets
-
-
Target
Ou6mS40OHrkbwQiM7ccaR.exe
-
Size
2.4MB
-
MD5
4ceeb0d068653ada01e702ba61dfdb7f
-
SHA1
0e09a416c381e657f39af975f259d09da0324300
-
SHA256
bfe4b2b5b1b9c2e8253848be27b277f1daf99314ff0ac964dc595bdef841a6c3
-
SHA512
798904e3ef1ef5f898185577c2dc15dd8872f4e70f638f8f94f90846ac11eecbad72d843406512863d58a882df8ad40c02ad2d9daa6289f3c46fff724f5f1b73
-
SSDEEP
24576:1RNpngHRc5DYZYLUsZ9p48N41XMFBDeQzC/tqELdO0U7TBd1X/SQOvjASm:PPDvx94V0eQuPdmJdV/J
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-