General
-
Target
5adfa60026465144e6410fab3f714d2e
-
Size
1.4MB
-
Sample
240114-lbl61sgeh7
-
MD5
5adfa60026465144e6410fab3f714d2e
-
SHA1
daa4b6471384b111da3d580f9c41ceabed9dbd15
-
SHA256
cef243d8fa4ef4cb108c2cabbf0a3b17dd02aea213776351720612dc69669e68
-
SHA512
2589ca8deda6fd755bca15dca36339e9d56c9fab18145f3632e440eeaba14f0e400e9f18bf6a0f8471eef76ce98759af9d85c11c1bfce09cf8c50a277406ca19
-
SSDEEP
24576:U2G/nvxW3Ww0tl3RIlDkd7nbq/uqjcUvuqs/b37CwPhNkxf+4z:UbA30lgy7nbq/9SqsaaNtw
Behavioral task
behavioral1
Sample
5adfa60026465144e6410fab3f714d2e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5adfa60026465144e6410fab3f714d2e.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
5adfa60026465144e6410fab3f714d2e
-
Size
1.4MB
-
MD5
5adfa60026465144e6410fab3f714d2e
-
SHA1
daa4b6471384b111da3d580f9c41ceabed9dbd15
-
SHA256
cef243d8fa4ef4cb108c2cabbf0a3b17dd02aea213776351720612dc69669e68
-
SHA512
2589ca8deda6fd755bca15dca36339e9d56c9fab18145f3632e440eeaba14f0e400e9f18bf6a0f8471eef76ce98759af9d85c11c1bfce09cf8c50a277406ca19
-
SSDEEP
24576:U2G/nvxW3Ww0tl3RIlDkd7nbq/uqjcUvuqs/b37CwPhNkxf+4z:UbA30lgy7nbq/9SqsaaNtw
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-