General
-
Target
9781aaa439fcf85da08d40c5c3e3909f.bin
-
Size
2.5MB
-
Sample
230328-chqcksac5w
-
MD5
450531c541775a4a7c745c3b66688fe5
-
SHA1
73db0b6751338ac3aaea893c9901fe1b0d6f4c65
-
SHA256
71599c34f4bed1f26c86cbfe2f1bdffe2cfc1344e770d9228ce8bc38482d598e
-
SHA512
f166f3de276aeacde520fd972dacaf94d0ac831bd20b4b864f2b29d8829b84addb25e1b46d1991b49dcd808b931836a86e45ec54f3ae2789e99dfe50d68abd6c
-
SSDEEP
49152:ydLTMV6O4wHROXhDMwaq13zn/CR7BB8R9Fkljhy9rnyfjZ:6LTU6NeROXmp+Dn/CRDs9uljhy9rybZ
Behavioral task
behavioral1
Sample
413e93938387abf6009f38e415cdbb6d2c800a4a163cd3987c68bee89d432f35.exe
Resource
win7-20230220-en
Malware Config
Targets
-
-
Target
413e93938387abf6009f38e415cdbb6d2c800a4a163cd3987c68bee89d432f35.exe
-
Size
2.9MB
-
MD5
9781aaa439fcf85da08d40c5c3e3909f
-
SHA1
edd84aae94017cdde7dd564d2791c6389f98c01f
-
SHA256
413e93938387abf6009f38e415cdbb6d2c800a4a163cd3987c68bee89d432f35
-
SHA512
27be25ed8a4df487bbb3066a9d67ee8403cb91ec8f21aeb2367252c57cf209903f01f770394f6e9d05e627a7697a9ba446bea98f65f5be166f7be33c74dedd02
-
SSDEEP
49152:VVqaWggE8cLbTM0Qpx80y5tq4JyiK+RzzO/twfoLFAq4JNpFLP7:zqLggl0QpC0qt/JyV+hz5foLB4Jn
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-