General
-
Target
4020bfcac652310c77b3c5fa6a609098
-
Size
1.4MB
-
Sample
240104-g64mbschb3
-
MD5
4020bfcac652310c77b3c5fa6a609098
-
SHA1
072d892ed59b80cc1561c004dfc0ba5343fc530a
-
SHA256
79a6f43c7c03d086ebcf7c70a25b21e0888866344d889e35068e461ffb82444e
-
SHA512
09590ce01936bb6ffc2db2a15390820408c726ac65ae2d424edde0f1cc65caf3d1cc570935196eccc7cd454957c89f4a1bad8d820f869f766e49ffb371bddbd5
-
SSDEEP
24576:G7b6+NMFw50Rp8gXBeyebsBtqKl/NpP2RMJ+V8c6Js7+RzrdI/Ko+4:GPkeqGgXBeySsBZl2y281JGQzJFL
Behavioral task
behavioral1
Sample
4020bfcac652310c77b3c5fa6a609098.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4020bfcac652310c77b3c5fa6a609098.exe
Resource
win10v2004-20231222-en
Malware Config
Targets
-
-
Target
4020bfcac652310c77b3c5fa6a609098
-
Size
1.4MB
-
MD5
4020bfcac652310c77b3c5fa6a609098
-
SHA1
072d892ed59b80cc1561c004dfc0ba5343fc530a
-
SHA256
79a6f43c7c03d086ebcf7c70a25b21e0888866344d889e35068e461ffb82444e
-
SHA512
09590ce01936bb6ffc2db2a15390820408c726ac65ae2d424edde0f1cc65caf3d1cc570935196eccc7cd454957c89f4a1bad8d820f869f766e49ffb371bddbd5
-
SSDEEP
24576:G7b6+NMFw50Rp8gXBeyebsBtqKl/NpP2RMJ+V8c6Js7+RzrdI/Ko+4:GPkeqGgXBeySsBZl2y281JGQzJFL
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops file in System32 directory
-