General
-
Target
c1d0b2c516e0ccd591338611ec76efb6c26ba1731de37c50c7c443bdb027c2a2
-
Size
5.7MB
-
Sample
230129-srns4sde7x
-
MD5
9ca968e7fe7c40a6324e047ccca6a7d6
-
SHA1
c48a0f1bbcf242e50b5239c72bfcd32dd64eaad7
-
SHA256
c1d0b2c516e0ccd591338611ec76efb6c26ba1731de37c50c7c443bdb027c2a2
-
SHA512
9e33e3584dacc531516bb98ead6a151c250c82f3518d2b3c44347ed2fee2f99285457f9a1d8752bc06ea48dfee267a07a4ce834d7155766352930bcc65c34b98
-
SSDEEP
98304:ZTEWU8jUj8sS/MZIZPP0G/tY1QWDIJbjRH5ux9fgAfBmRGUU3CF/5NCDNxX5EGVE:pUlIsGMZEP8G/tmQGyjRUx9hBmUeIFC1
Behavioral task
behavioral1
Sample
c1d0b2c516e0ccd591338611ec76efb6c26ba1731de37c50c7c443bdb027c2a2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c1d0b2c516e0ccd591338611ec76efb6c26ba1731de37c50c7c443bdb027c2a2.exe
Resource
win10v2004-20221111-en
Malware Config
Targets
-
-
Target
c1d0b2c516e0ccd591338611ec76efb6c26ba1731de37c50c7c443bdb027c2a2
-
Size
5.7MB
-
MD5
9ca968e7fe7c40a6324e047ccca6a7d6
-
SHA1
c48a0f1bbcf242e50b5239c72bfcd32dd64eaad7
-
SHA256
c1d0b2c516e0ccd591338611ec76efb6c26ba1731de37c50c7c443bdb027c2a2
-
SHA512
9e33e3584dacc531516bb98ead6a151c250c82f3518d2b3c44347ed2fee2f99285457f9a1d8752bc06ea48dfee267a07a4ce834d7155766352930bcc65c34b98
-
SSDEEP
98304:ZTEWU8jUj8sS/MZIZPP0G/tY1QWDIJbjRH5ux9fgAfBmRGUU3CF/5NCDNxX5EGVE:pUlIsGMZEP8G/tmQGyjRUx9hBmUeIFC1
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-