General
-
Target
080dea74b4e8c480a3dc1be07c13eeeb
-
Size
1.4MB
-
Sample
231230-afqt8agfb4
-
MD5
080dea74b4e8c480a3dc1be07c13eeeb
-
SHA1
7ec15f32916c21efd92db1f52b1edc9c4e81df35
-
SHA256
f28cc0f1f1a0408490a39ab982477aa19dc7b199c599e9f9a89e62f2f423a24d
-
SHA512
52fe5f40fe8b46b17441c913e2abeedc597d9a8e5ebdfb7322ac5050785d9e8e69cc38b0a64b2e42d495f929ea49497427f719d6bcaf16b6ba5183f3d81af91e
-
SSDEEP
24576:wUesxbPoSf/0W4vVo6m+p2EFV0/hkAGmo+M5AMGlVrfelPMEeA6yy+4:pJ0W4vANaPmbM9wFeplZ7F
Behavioral task
behavioral1
Sample
080dea74b4e8c480a3dc1be07c13eeeb.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
080dea74b4e8c480a3dc1be07c13eeeb.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
080dea74b4e8c480a3dc1be07c13eeeb
-
Size
1.4MB
-
MD5
080dea74b4e8c480a3dc1be07c13eeeb
-
SHA1
7ec15f32916c21efd92db1f52b1edc9c4e81df35
-
SHA256
f28cc0f1f1a0408490a39ab982477aa19dc7b199c599e9f9a89e62f2f423a24d
-
SHA512
52fe5f40fe8b46b17441c913e2abeedc597d9a8e5ebdfb7322ac5050785d9e8e69cc38b0a64b2e42d495f929ea49497427f719d6bcaf16b6ba5183f3d81af91e
-
SSDEEP
24576:wUesxbPoSf/0W4vVo6m+p2EFV0/hkAGmo+M5AMGlVrfelPMEeA6yy+4:pJ0W4vANaPmbM9wFeplZ7F
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops file in System32 directory
-