General
-
Target
F7DCB53C2C0FFF4FA83CA2BE73ACB9D7.exe
-
Size
1.8MB
-
Sample
231016-nhv4lsdg2y
-
MD5
f7dcb53c2c0fff4fa83ca2be73acb9d7
-
SHA1
2089ad257388c2b30a0394e44b65161c748f12f5
-
SHA256
658b0a01404144b5da03574e2a05b6c02030baa2276b9e047174c6ccb3e8918d
-
SHA512
829bde29c94800ef9314b81b679354719f3cee5bd5cd67926edde885f35094f2652bd013bfa0e828166ab632c91cdd71cd5171da57fdbf35bd16c31013815992
-
SSDEEP
49152:gqgWYHPoKznG6++0p7eFv+DswjGb8Z4l7Mb9WtRgg2:XrYfaI9apRW3
Static task
static1
Behavioral task
behavioral1
Sample
F7DCB53C2C0FFF4FA83CA2BE73ACB9D7.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
F7DCB53C2C0FFF4FA83CA2BE73ACB9D7.exe
Resource
win10v2004-20230915-en
Malware Config
Targets
-
-
Target
F7DCB53C2C0FFF4FA83CA2BE73ACB9D7.exe
-
Size
1.8MB
-
MD5
f7dcb53c2c0fff4fa83ca2be73acb9d7
-
SHA1
2089ad257388c2b30a0394e44b65161c748f12f5
-
SHA256
658b0a01404144b5da03574e2a05b6c02030baa2276b9e047174c6ccb3e8918d
-
SHA512
829bde29c94800ef9314b81b679354719f3cee5bd5cd67926edde885f35094f2652bd013bfa0e828166ab632c91cdd71cd5171da57fdbf35bd16c31013815992
-
SSDEEP
49152:gqgWYHPoKznG6++0p7eFv+DswjGb8Z4l7Mb9WtRgg2:XrYfaI9apRW3
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-