General
-
Target
ed4e123b6451095714644fcf1367ba60.bin
-
Size
1.1MB
-
Sample
231118-d5x7daac43
-
MD5
ed4e123b6451095714644fcf1367ba60
-
SHA1
12a24314c6d55271d040f3a62703f6669ef51b61
-
SHA256
b957c6d107b4f671a489452761f99ce7ad7396e88f2d3f54310b44a39c87e9f7
-
SHA512
a26e311a29ac440f8339a97ae825a7afd4368afd02f258d2865c5a8690e27619470d09a083d8309655c441f292c681510a3b79aa5802846fd8a83acf54d698c5
-
SSDEEP
24576:6ADdteLS1VO6wLVqq0aJSw69voIN7y7Di0:cE86MVX/SwHmf
Behavioral task
behavioral1
Sample
ed4e123b6451095714644fcf1367ba60.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
ed4e123b6451095714644fcf1367ba60.exe
Resource
win10v2004-20231020-en
Malware Config
Targets
-
-
Target
ed4e123b6451095714644fcf1367ba60.bin
-
Size
1.1MB
-
MD5
ed4e123b6451095714644fcf1367ba60
-
SHA1
12a24314c6d55271d040f3a62703f6669ef51b61
-
SHA256
b957c6d107b4f671a489452761f99ce7ad7396e88f2d3f54310b44a39c87e9f7
-
SHA512
a26e311a29ac440f8339a97ae825a7afd4368afd02f258d2865c5a8690e27619470d09a083d8309655c441f292c681510a3b79aa5802846fd8a83acf54d698c5
-
SSDEEP
24576:6ADdteLS1VO6wLVqq0aJSw69voIN7y7Di0:cE86MVX/SwHmf
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-