General
-
Target
HEUR-Trojan-Spy.MSIL.Stealer.gen-a7c4851eb45e.exe
-
Size
1.1MB
-
Sample
230201-tqslcaaf63
-
MD5
4d3227c49bb3db6940a04296e0c7ad1b
-
SHA1
21a152feb2ef0ffba34587b63a832bf47c696be5
-
SHA256
a7c4851eb45e364c5d00a0ac9604be177f5ce178525599f63995e3527ef4a93b
-
SHA512
1718378593be5159e53ff7ba36b5fe4eb72869cc9a9a05b100eda0414bc416ef65fefdb5a454e7948fab486897de91f0e245cfaed0539aebd1c98e0ce988f058
-
SSDEEP
24576:tOX6SP7prgJDBT5HHcwsQMghdR/O483h4vAe+4:edeDBT5cbQhnbk
Behavioral task
behavioral1
Sample
HEUR-Trojan-Spy.MSIL.Stealer.gen-a7c4851eb45e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
HEUR-Trojan-Spy.MSIL.Stealer.gen-a7c4851eb45e.exe
Resource
win10v2004-20220901-en
Malware Config
Targets
-
-
Target
HEUR-Trojan-Spy.MSIL.Stealer.gen-a7c4851eb45e.exe
-
Size
1.1MB
-
MD5
4d3227c49bb3db6940a04296e0c7ad1b
-
SHA1
21a152feb2ef0ffba34587b63a832bf47c696be5
-
SHA256
a7c4851eb45e364c5d00a0ac9604be177f5ce178525599f63995e3527ef4a93b
-
SHA512
1718378593be5159e53ff7ba36b5fe4eb72869cc9a9a05b100eda0414bc416ef65fefdb5a454e7948fab486897de91f0e245cfaed0539aebd1c98e0ce988f058
-
SSDEEP
24576:tOX6SP7prgJDBT5HHcwsQMghdR/O483h4vAe+4:edeDBT5cbQhnbk
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Drops file in System32 directory
-