General
-
Target
000c25f85640678f636a31909dbf94e7.exe
-
Size
1.7MB
-
Sample
231012-fylk4shc5w
-
MD5
000c25f85640678f636a31909dbf94e7
-
SHA1
55b1fca413b176d243caf796af4358a510ad931a
-
SHA256
5a41a105b733d97acc93315066ac39f50c2d2923df02d86c5b0b143fc3e82ff6
-
SHA512
93ea97e0334d94269ca888b347c24bc8215ac5b579be9816b5328c8439287048484b08bd9a41c4465aaeebbc9e2d8b9bd953c52d74f987206e8ceff1a5adf5d5
-
SSDEEP
12288:y+CW3EFxVkNFuwoUDInV/kg0d0lx743tIm2atsbWvL50R0cf9AQyIpHnMuDaP41:yg3BNloUDi4LFueIyR+w7V33Vd
Static task
static1
Behavioral task
behavioral1
Sample
000c25f85640678f636a31909dbf94e7.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
000c25f85640678f636a31909dbf94e7.exe
Resource
win10v2004-20230915-en
Malware Config
Targets
-
-
Target
000c25f85640678f636a31909dbf94e7.exe
-
Size
1.7MB
-
MD5
000c25f85640678f636a31909dbf94e7
-
SHA1
55b1fca413b176d243caf796af4358a510ad931a
-
SHA256
5a41a105b733d97acc93315066ac39f50c2d2923df02d86c5b0b143fc3e82ff6
-
SHA512
93ea97e0334d94269ca888b347c24bc8215ac5b579be9816b5328c8439287048484b08bd9a41c4465aaeebbc9e2d8b9bd953c52d74f987206e8ceff1a5adf5d5
-
SSDEEP
12288:y+CW3EFxVkNFuwoUDInV/kg0d0lx743tIm2atsbWvL50R0cf9AQyIpHnMuDaP41:yg3BNloUDi4LFueIyR+w7V33Vd
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-