General
-
Target
90DAA21921C8CA1EABCBB3E6C957D912C80809050537E.exe
-
Size
828KB
-
Sample
230601-q9j7jaee95
-
MD5
ece82b00b9400f1d09a763853964e291
-
SHA1
b1b36fcd10ff7833f9bb430ea371df5d295498af
-
SHA256
90daa21921c8ca1eabcbb3e6c957d912c80809050537e688530b202bd81bfc57
-
SHA512
52896f2e27d37356a1c7fa1c37c058d5a4a19164645253ac57f34d4f1a0644c9e08f9e651d1ce4b9968a97a95a76c8299592e19883ae461aa7bc88e4d6f46519
-
SSDEEP
12288:NaKyDgt9n5S56ZJ2dUWmBXcKOLUJMgAGuhLbLwN:NyDgt9n4iJ2dUbXwRgAGuLbLwN
Behavioral task
behavioral1
Sample
90DAA21921C8CA1EABCBB3E6C957D912C80809050537E.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
90DAA21921C8CA1EABCBB3E6C957D912C80809050537E.exe
Resource
win10v2004-20230220-en
Malware Config
Targets
-
-
Target
90DAA21921C8CA1EABCBB3E6C957D912C80809050537E.exe
-
Size
828KB
-
MD5
ece82b00b9400f1d09a763853964e291
-
SHA1
b1b36fcd10ff7833f9bb430ea371df5d295498af
-
SHA256
90daa21921c8ca1eabcbb3e6c957d912c80809050537e688530b202bd81bfc57
-
SHA512
52896f2e27d37356a1c7fa1c37c058d5a4a19164645253ac57f34d4f1a0644c9e08f9e651d1ce4b9968a97a95a76c8299592e19883ae461aa7bc88e4d6f46519
-
SSDEEP
12288:NaKyDgt9n5S56ZJ2dUWmBXcKOLUJMgAGuhLbLwN:NyDgt9n4iJ2dUbXwRgAGuLbLwN
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-