General
-
Target
02588099.exe
-
Size
1MB
-
Sample
230531-han3fadc67
-
MD5
6f6a61090a9add724eebbec1c558826b
-
SHA1
566ea8db4bcea2d078fb71be08bc8e7003e36119
-
SHA256
c6244c8e4e4cdecd641017d52d344b1db6a23d05fd6a8ad338c8f4f77481f483
-
SHA512
47d88347a9082186b9667fcf3994d2fe212f09a5665cc82017d48f8833e8a67823b6b66bf3a5dbda5369dd6d1585248389e213a4b3556e8b0b0b66c137eb8aa8
-
SSDEEP
24576:4LS70OsASkYS827M+8NFNzmJd+eVjW2LGLrk2WKiT:gS70OfRhxW1c2vi
Behavioral task
behavioral1
Sample
02588099.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
02588099.exe
Resource
win10v2004-20230220-en
Malware Config
Targets
-
-
Target
02588099.exe
-
Size
1MB
-
MD5
6f6a61090a9add724eebbec1c558826b
-
SHA1
566ea8db4bcea2d078fb71be08bc8e7003e36119
-
SHA256
c6244c8e4e4cdecd641017d52d344b1db6a23d05fd6a8ad338c8f4f77481f483
-
SHA512
47d88347a9082186b9667fcf3994d2fe212f09a5665cc82017d48f8833e8a67823b6b66bf3a5dbda5369dd6d1585248389e213a4b3556e8b0b0b66c137eb8aa8
-
SSDEEP
24576:4LS70OsASkYS827M+8NFNzmJd+eVjW2LGLrk2WKiT:gS70OfRhxW1c2vi
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-