General
-
Target
49086652f203c5698a87bc4a7ce6fd8e.exe
-
Size
1.1MB
-
Sample
230313-lfxhjsbf8s
-
MD5
49086652f203c5698a87bc4a7ce6fd8e
-
SHA1
a8cc3511a93c52824f67b5dece519ceced2f6e82
-
SHA256
ace3286e12f4b3e483a878b85e20df0523e606d42ed52297706cbb933244256e
-
SHA512
74fe0be5060c1d35abc781f83edc5fead6a7a6057dfd99632aa2fb277d11380f57bd9cbc6f8721fb144e7aec8ce3a745e587fe218279cde3889a00419cdf0c10
-
SSDEEP
24576:6Yis4Yms1W3UhmdvT9fIaQTp9Wm7rUDtnA/:7is4ts1LhmhT+aQWm/UD9A/
Static task
static1
Behavioral task
behavioral1
Sample
49086652f203c5698a87bc4a7ce6fd8e.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
49086652f203c5698a87bc4a7ce6fd8e.exe
Resource
win10v2004-20230220-en
Malware Config
Targets
-
-
Target
49086652f203c5698a87bc4a7ce6fd8e.exe
-
Size
1.1MB
-
MD5
49086652f203c5698a87bc4a7ce6fd8e
-
SHA1
a8cc3511a93c52824f67b5dece519ceced2f6e82
-
SHA256
ace3286e12f4b3e483a878b85e20df0523e606d42ed52297706cbb933244256e
-
SHA512
74fe0be5060c1d35abc781f83edc5fead6a7a6057dfd99632aa2fb277d11380f57bd9cbc6f8721fb144e7aec8ce3a745e587fe218279cde3889a00419cdf0c10
-
SSDEEP
24576:6Yis4Yms1W3UhmdvT9fIaQTp9Wm7rUDtnA/:7is4ts1LhmhT+aQWm/UD9A/
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-