General
-
Target
B4E04DE4587E063DB108E9EB85C7203C.exe
-
Size
1.5MB
-
Sample
240126-xw5dwadhen
-
MD5
b4e04de4587e063db108e9eb85c7203c
-
SHA1
f557073fe11b2cb1a41ad8336ef58bead962b80f
-
SHA256
1bd1ae392a1cad614831e936fb8783abdcdbe7de3b39e069ae008670342b0854
-
SHA512
2a6340c2ea662519b9a6cb75fb8188048232fea2ee0ad1b4107a19ae2473cec194923041e0c165a0cc0de4a22d4b6c4e6781f65f91b9b8a02946a91a6d9b43c2
-
SSDEEP
24576:1ZX3kGr+WWpXwbTusB9cmbcgE+qhBXLM8y5f16ODj2+4w77QAO/gUm3FYrrZmXe:HnRr+/XB6G+sLQ1l9XUm3yxB
Static task
static1
Behavioral task
behavioral1
Sample
B4E04DE4587E063DB108E9EB85C7203C.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
B4E04DE4587E063DB108E9EB85C7203C.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
B4E04DE4587E063DB108E9EB85C7203C.exe
-
Size
1.5MB
-
MD5
b4e04de4587e063db108e9eb85c7203c
-
SHA1
f557073fe11b2cb1a41ad8336ef58bead962b80f
-
SHA256
1bd1ae392a1cad614831e936fb8783abdcdbe7de3b39e069ae008670342b0854
-
SHA512
2a6340c2ea662519b9a6cb75fb8188048232fea2ee0ad1b4107a19ae2473cec194923041e0c165a0cc0de4a22d4b6c4e6781f65f91b9b8a02946a91a6d9b43c2
-
SSDEEP
24576:1ZX3kGr+WWpXwbTusB9cmbcgE+qhBXLM8y5f16ODj2+4w77QAO/gUm3FYrrZmXe:HnRr+/XB6G+sLQ1l9XUm3yxB
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-