General
-
Target
96b675ea1180623cbaaab1a0fa5028320bf161fa829bfa922a4b920160b47def
-
Size
4.1MB
-
Sample
230201-n6yveafa3w
-
MD5
57b08e037d5b265b459aefdf565d817a
-
SHA1
525b42a7c5a736c45810bdeab451301673c775b8
-
SHA256
96b675ea1180623cbaaab1a0fa5028320bf161fa829bfa922a4b920160b47def
-
SHA512
77ff717f277ec544b88760ff08dd19134669b7c0b109d141daf3695686402ef57db4d38fddaf64945adc72da05af55dd9f427590eca5f4c96bddc3ffa28a3422
-
SSDEEP
98304:Xvb+8kiY/43mw/pKVw6GL2MDo17yxfdo6Co5auE/INc:Xm3w312GSMDo1yH
Static task
static1
Behavioral task
behavioral1
Sample
96b675ea1180623cbaaab1a0fa5028320bf161fa829bfa922a4b920160b47def.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
amadey
3.65
77.73.134.27/8bmdh3Slb2/index.php
Targets
-
-
Target
96b675ea1180623cbaaab1a0fa5028320bf161fa829bfa922a4b920160b47def
-
Size
4.1MB
-
MD5
57b08e037d5b265b459aefdf565d817a
-
SHA1
525b42a7c5a736c45810bdeab451301673c775b8
-
SHA256
96b675ea1180623cbaaab1a0fa5028320bf161fa829bfa922a4b920160b47def
-
SHA512
77ff717f277ec544b88760ff08dd19134669b7c0b109d141daf3695686402ef57db4d38fddaf64945adc72da05af55dd9f427590eca5f4c96bddc3ffa28a3422
-
SSDEEP
98304:Xvb+8kiY/43mw/pKVw6GL2MDo17yxfdo6Co5auE/INc:Xm3w312GSMDo1yH
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Detects Smokeloader packer
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-