General
-
Target
9781aaa439fcf85da08d40c5c3e3909f.exe
-
Size
2.9MB
-
Sample
230326-zkafgabh9s
-
MD5
9781aaa439fcf85da08d40c5c3e3909f
-
SHA1
edd84aae94017cdde7dd564d2791c6389f98c01f
-
SHA256
413e93938387abf6009f38e415cdbb6d2c800a4a163cd3987c68bee89d432f35
-
SHA512
27be25ed8a4df487bbb3066a9d67ee8403cb91ec8f21aeb2367252c57cf209903f01f770394f6e9d05e627a7697a9ba446bea98f65f5be166f7be33c74dedd02
-
SSDEEP
49152:VVqaWggE8cLbTM0Qpx80y5tq4JyiK+RzzO/twfoLFAq4JNpFLP7:zqLggl0QpC0qt/JyV+hz5foLB4Jn
Behavioral task
behavioral1
Sample
9781aaa439fcf85da08d40c5c3e3909f.exe
Resource
win7-20230220-en
Malware Config
Targets
-
-
Target
9781aaa439fcf85da08d40c5c3e3909f.exe
-
Size
2.9MB
-
MD5
9781aaa439fcf85da08d40c5c3e3909f
-
SHA1
edd84aae94017cdde7dd564d2791c6389f98c01f
-
SHA256
413e93938387abf6009f38e415cdbb6d2c800a4a163cd3987c68bee89d432f35
-
SHA512
27be25ed8a4df487bbb3066a9d67ee8403cb91ec8f21aeb2367252c57cf209903f01f770394f6e9d05e627a7697a9ba446bea98f65f5be166f7be33c74dedd02
-
SSDEEP
49152:VVqaWggE8cLbTM0Qpx80y5tq4JyiK+RzzO/twfoLFAq4JNpFLP7:zqLggl0QpC0qt/JyV+hz5foLB4Jn
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-