General
-
Target
PZCheat.rar
-
Size
1.3MB
-
Sample
230202-dnnxdagd5s
-
MD5
8b862540a3b2b61ac121451f21ec5a31
-
SHA1
b7cdf45ad54554ab5f425c609818e89491d3d45f
-
SHA256
941f69dfaf5589ff59a8e9e2958af2ebad874806e533f74a47982c9491c26e2c
-
SHA512
5991e3a3b945bbcb0b63bf06373c864f4aa68305899d2d6585808d1cd81c9cc91286d73aba2515e51c89850f829260a29ba5949a629eeaadb3949d3eeec8c2cc
-
SSDEEP
24576:YiwvPYQ7qgTMjlBX6VgM5buUxBug8ffXHITgONuEdsIUJyXbFdMTVU:QvPn7qYMD6V3bup5XHIcOUEehupdMW
Static task
static1
Behavioral task
behavioral1
Sample
PZCheat.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
PZCheat.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
PZCheat.exe
-
Size
1.5MB
-
MD5
164ba5ee6f6b30539e874248ccfa4c05
-
SHA1
6b14ed8dab712359453779f2896e1cbad78871d7
-
SHA256
fc7ca5dbd9e3d228416ea9725c7283d105d75533f7a4e069d89f2632840e1a5d
-
SHA512
c9b2eef0e4499832f9c4eca8b503f17f4cc7589d0d2b12fe82572ad5df23e85cef9267bdc24928b7ac6df0fff70fe49d2422d6e9a549f07a74c8f9bd47892cfc
-
SSDEEP
24576:B2G/nvxW3WLRnhzLfSRyBWkNUk9tJIzxIq2+kt3S5wFAiQuwV4ilByjNTVu1:BbA3+p9SRyBW0Tty2E5wFzQuo4iupRu1
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-