General
-
Target
3cb976f6c38245b11a73fab6ad925275.exe
-
Size
2.5MB
-
Sample
230707-w7g72sbf2y
-
MD5
3cb976f6c38245b11a73fab6ad925275
-
SHA1
70a9bd4b2b1c59ea18723e21bf9e8e04fa475ddd
-
SHA256
24ff6bf5d0db45669b7167ffc8106a0d2f4d87f52885163d91c3e42d66aea434
-
SHA512
d884fd8026d382b2d91b0c3f92a51171da70a5071425ee4fb2de79025d01198ba7469a6a6c8801d80ddc52655c7b307093b9b3b5b4527063ab4f8a16849b9207
-
SSDEEP
49152:/bA38/3Vwmr+P0nqCUalvFgvehzVUHxI43Gm1EOsuUadDa1x:/bHBr+P0qCLpFgve9VURI4F7Rrdm1x
Behavioral task
behavioral1
Sample
3cb976f6c38245b11a73fab6ad925275.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
3cb976f6c38245b11a73fab6ad925275.exe
Resource
win10v2004-20230703-en
Malware Config
Targets
-
-
Target
3cb976f6c38245b11a73fab6ad925275.exe
-
Size
2.5MB
-
MD5
3cb976f6c38245b11a73fab6ad925275
-
SHA1
70a9bd4b2b1c59ea18723e21bf9e8e04fa475ddd
-
SHA256
24ff6bf5d0db45669b7167ffc8106a0d2f4d87f52885163d91c3e42d66aea434
-
SHA512
d884fd8026d382b2d91b0c3f92a51171da70a5071425ee4fb2de79025d01198ba7469a6a6c8801d80ddc52655c7b307093b9b3b5b4527063ab4f8a16849b9207
-
SSDEEP
49152:/bA38/3Vwmr+P0nqCUalvFgvehzVUHxI43Gm1EOsuUadDa1x:/bHBr+P0qCLpFgve9VURI4F7Rrdm1x
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-