General
-
Target
2462e26144fa12fd2ca9dce4d2c13420.exe
-
Size
1002KB
-
Sample
230319-txhpqahb83
-
MD5
2462e26144fa12fd2ca9dce4d2c13420
-
SHA1
39151c10b343122006aaa172f1f1554a38137528
-
SHA256
6fe3e7b8886862e6c2e9ea8684396da80e57ca2c1f85026e7edc0ae6cef80c35
-
SHA512
d9dc3df7635afd99e49f2851443ab274063badbfb3382eab4fdf373c5a5aede7d3755f009000bc6dd3a6318bf158e8c4bd00999cb1a09cfbb5239b513ea858ca
-
SSDEEP
24576:IxBKgJkikTpvNX6Uc3GawHa/Z2twSbIAflddj6T:IiXLv8UAw6/oPEudj6
Behavioral task
behavioral1
Sample
2462e26144fa12fd2ca9dce4d2c13420.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
2462e26144fa12fd2ca9dce4d2c13420.exe
Resource
win10v2004-20230220-en
Malware Config
Targets
-
-
Target
2462e26144fa12fd2ca9dce4d2c13420.exe
-
Size
1002KB
-
MD5
2462e26144fa12fd2ca9dce4d2c13420
-
SHA1
39151c10b343122006aaa172f1f1554a38137528
-
SHA256
6fe3e7b8886862e6c2e9ea8684396da80e57ca2c1f85026e7edc0ae6cef80c35
-
SHA512
d9dc3df7635afd99e49f2851443ab274063badbfb3382eab4fdf373c5a5aede7d3755f009000bc6dd3a6318bf158e8c4bd00999cb1a09cfbb5239b513ea858ca
-
SSDEEP
24576:IxBKgJkikTpvNX6Uc3GawHa/Z2twSbIAflddj6T:IiXLv8UAw6/oPEudj6
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-