General
-
Target
IY8XD9Em5aR57Lxnxdzxehs8.exe
-
Size
1.2MB
-
Sample
230130-cmvg4adf23
-
MD5
32c8eec5e81fede3724b82fd282f1cff
-
SHA1
539dbe8acf63ceb62b5af8b567f4eb7c70beec1d
-
SHA256
195b2055f09486e3708bc421dc84316e8bfc1f1c85e223a04f1fe046e15ba197
-
SHA512
6eb87b91990f7a3e7e4bdd6883f98ee1ebc25509dae84c358fb72a5420bdc0dff1343192e07617981b823517dd79b41abde3a9a3c5e7a8a1bcaf1630651e4718
-
SSDEEP
12288:RpxNE5GIgNQAnBHRLyd51fRpOfpUi1i/jIEtk7VqMIE4/A7CrVuqTMMP1QYyXR3a:RpxNJFpHR+7OCGdpaEeueCYSnnty
Behavioral task
behavioral1
Sample
IY8XD9Em5aR57Lxnxdzxehs8.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
IY8XD9Em5aR57Lxnxdzxehs8.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
IY8XD9Em5aR57Lxnxdzxehs8.exe
-
Size
1.2MB
-
MD5
32c8eec5e81fede3724b82fd282f1cff
-
SHA1
539dbe8acf63ceb62b5af8b567f4eb7c70beec1d
-
SHA256
195b2055f09486e3708bc421dc84316e8bfc1f1c85e223a04f1fe046e15ba197
-
SHA512
6eb87b91990f7a3e7e4bdd6883f98ee1ebc25509dae84c358fb72a5420bdc0dff1343192e07617981b823517dd79b41abde3a9a3c5e7a8a1bcaf1630651e4718
-
SSDEEP
12288:RpxNE5GIgNQAnBHRLyd51fRpOfpUi1i/jIEtk7VqMIE4/A7CrVuqTMMP1QYyXR3a:RpxNJFpHR+7OCGdpaEeueCYSnnty
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-