General
-
Target
2e8356dfe51bd0a98aadcbd170a6d777.exe
-
Size
1.2MB
-
Sample
231205-wajplsea29
-
MD5
2e8356dfe51bd0a98aadcbd170a6d777
-
SHA1
4bd29d52517f4b14433ca5e911e277123968dbfb
-
SHA256
e4ae89fae552ad33c4e25a0feb8f8547254f27c197e51c183ee16edae898f6c8
-
SHA512
2615a8c39079d57e70dcae1c0f180e4a6d292348c28d8c094f9b1312bfbd74f02e40bada740faadd563c061067f99dde00de32d71d261b1424ed1ef8ce0926ef
-
SSDEEP
24576:N3sTOPjpOgaRtddWpNs1e9fvz+iPRdz5nk86:OTScbRcp1nl
Behavioral task
behavioral1
Sample
2e8356dfe51bd0a98aadcbd170a6d777.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
2e8356dfe51bd0a98aadcbd170a6d777.exe
Resource
win10v2004-20231130-en
Malware Config
Targets
-
-
Target
2e8356dfe51bd0a98aadcbd170a6d777.exe
-
Size
1.2MB
-
MD5
2e8356dfe51bd0a98aadcbd170a6d777
-
SHA1
4bd29d52517f4b14433ca5e911e277123968dbfb
-
SHA256
e4ae89fae552ad33c4e25a0feb8f8547254f27c197e51c183ee16edae898f6c8
-
SHA512
2615a8c39079d57e70dcae1c0f180e4a6d292348c28d8c094f9b1312bfbd74f02e40bada740faadd563c061067f99dde00de32d71d261b1424ed1ef8ce0926ef
-
SSDEEP
24576:N3sTOPjpOgaRtddWpNs1e9fvz+iPRdz5nk86:OTScbRcp1nl
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-