General
-
Target
08f9a18f4de15af671058b281a60074e.exe
-
Size
892KB
-
Sample
230205-s1w6vaaa49
-
MD5
08f9a18f4de15af671058b281a60074e
-
SHA1
a453e40ec014f394f1fca8dc7e98fb4360872611
-
SHA256
d74b04f8a51f9974eccaad656b53ca535529a82d79d4e451a8bed890df2dce69
-
SHA512
fb6d8b9d5ed1b6e48dada8bfe6c5a4e343bc9277d656b40210a6814fdffd05bf875cdfae867f3d1661ac7c8dd3c782e55e6a9046307f66cb125dc8edcba7014f
-
SSDEEP
24576:pLzyRU52j4apzuIPJ0hDSs0od7smDiatqG4yPa:5zyRUZscZ7smDQ
Static task
static1
Behavioral task
behavioral1
Sample
08f9a18f4de15af671058b281a60074e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
08f9a18f4de15af671058b281a60074e.exe
Resource
win10v2004-20221111-en
Malware Config
Targets
-
-
Target
08f9a18f4de15af671058b281a60074e.exe
-
Size
892KB
-
MD5
08f9a18f4de15af671058b281a60074e
-
SHA1
a453e40ec014f394f1fca8dc7e98fb4360872611
-
SHA256
d74b04f8a51f9974eccaad656b53ca535529a82d79d4e451a8bed890df2dce69
-
SHA512
fb6d8b9d5ed1b6e48dada8bfe6c5a4e343bc9277d656b40210a6814fdffd05bf875cdfae867f3d1661ac7c8dd3c782e55e6a9046307f66cb125dc8edcba7014f
-
SSDEEP
24576:pLzyRU52j4apzuIPJ0hDSs0od7smDiatqG4yPa:5zyRUZscZ7smDQ
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-