General
-
Target
1ebda5cfb762d7884f46792cb1d12adb.exe
-
Size
8.0MB
-
Sample
230323-23dlyscg4y
-
MD5
1ebda5cfb762d7884f46792cb1d12adb
-
SHA1
22f9c3c64dd3d13c2453a1872e3ad59491f6d101
-
SHA256
bec2656a4413d2cb9d64f99d3b72472989197434a637ed136858ed782b293a50
-
SHA512
ec700ceb9af2b0eea226d3f1f0b2ed46dfe60a0364f4b676f524db4d2a542db1eb961d466c59bb0e3a2fcbfc9521d8d354ac607c528b90ebd1787edd0126437a
-
SSDEEP
196608:0PbgMfpayqnxbAQ5owejuJDUX47dwdW0vnFwBTYPERR+:KzYyoxCaUX47d4XnwZQ
Behavioral task
behavioral1
Sample
1ebda5cfb762d7884f46792cb1d12adb.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1ebda5cfb762d7884f46792cb1d12adb.exe
Resource
win10v2004-20230221-en
Malware Config
Targets
-
-
Target
1ebda5cfb762d7884f46792cb1d12adb.exe
-
Size
8.0MB
-
MD5
1ebda5cfb762d7884f46792cb1d12adb
-
SHA1
22f9c3c64dd3d13c2453a1872e3ad59491f6d101
-
SHA256
bec2656a4413d2cb9d64f99d3b72472989197434a637ed136858ed782b293a50
-
SHA512
ec700ceb9af2b0eea226d3f1f0b2ed46dfe60a0364f4b676f524db4d2a542db1eb961d466c59bb0e3a2fcbfc9521d8d354ac607c528b90ebd1787edd0126437a
-
SSDEEP
196608:0PbgMfpayqnxbAQ5owejuJDUX47dwdW0vnFwBTYPERR+:KzYyoxCaUX47d4XnwZQ
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-