General
-
Target
23E67C1D86130177DD66DE26BCF6DA711F4D0B7C7BE29.exe
-
Size
2MB
-
Sample
230607-kywtashc85
-
MD5
d35b5bab08ed6803970d14f007dc8ee3
-
SHA1
b9613baaf96d486ed66de01a20d5f5c033909009
-
SHA256
23e67c1d86130177dd66de26bcf6da711f4d0b7c7be298b891f6ed78aaa92f6d
-
SHA512
6c5bf98751d014991d334b808c544dcdc73f02ba207b69ec524f2b2bcdc72c24d5b2b25100d56001e03b38c4977f4d16621fc0ea78ca899f67d92deeb6e7027f
-
SSDEEP
49152:vveqMsE56Ff0uutJufj+B5PcX/OtnDTtFjnbHIJZrZBBx5QfU:vv8aFDklB5PcX/mdF7bHIJZr3Bx5M
Behavioral task
behavioral1
Sample
23E67C1D86130177DD66DE26BCF6DA711F4D0B7C7BE29.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
23E67C1D86130177DD66DE26BCF6DA711F4D0B7C7BE29.exe
Resource
win10v2004-20230220-en
Malware Config
Targets
-
-
Target
23E67C1D86130177DD66DE26BCF6DA711F4D0B7C7BE29.exe
-
Size
2MB
-
MD5
d35b5bab08ed6803970d14f007dc8ee3
-
SHA1
b9613baaf96d486ed66de01a20d5f5c033909009
-
SHA256
23e67c1d86130177dd66de26bcf6da711f4d0b7c7be298b891f6ed78aaa92f6d
-
SHA512
6c5bf98751d014991d334b808c544dcdc73f02ba207b69ec524f2b2bcdc72c24d5b2b25100d56001e03b38c4977f4d16621fc0ea78ca899f67d92deeb6e7027f
-
SSDEEP
49152:vveqMsE56Ff0uutJufj+B5PcX/OtnDTtFjnbHIJZrZBBx5QfU:vv8aFDklB5PcX/mdF7bHIJZr3Bx5M
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-