General
-
Target
1a37c620ab76bd059d5b873044c4ee9f2a887eda41858fce530f5927904364f2.exe
-
Size
828KB
-
Sample
240228-ty1lxsgc6y
-
MD5
2c27fd4281e3d2fd5064b6c7ab580cba
-
SHA1
296d0a49d61deb7e5c3ac531fa120573fa600bf1
-
SHA256
1a37c620ab76bd059d5b873044c4ee9f2a887eda41858fce530f5927904364f2
-
SHA512
459b3f288248e8f78b1c037bdfc903708326b149d2092974832a48651db5d0c3ed3b66156527d1a3b5bef87b01a03f11312d4d8a3eb1144508261a6ca2812d62
-
SSDEEP
12288:YDM3kEd7hjGpZU2P8n36ES4xPK4nn/ofJNNZUrLCF0ywx19KBM:97E3U/n3M4xPKUqFZQG5OHuM
Behavioral task
behavioral1
Sample
1a37c620ab76bd059d5b873044c4ee9f2a887eda41858fce530f5927904364f2.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1a37c620ab76bd059d5b873044c4ee9f2a887eda41858fce530f5927904364f2.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
1a37c620ab76bd059d5b873044c4ee9f2a887eda41858fce530f5927904364f2.exe
-
Size
828KB
-
MD5
2c27fd4281e3d2fd5064b6c7ab580cba
-
SHA1
296d0a49d61deb7e5c3ac531fa120573fa600bf1
-
SHA256
1a37c620ab76bd059d5b873044c4ee9f2a887eda41858fce530f5927904364f2
-
SHA512
459b3f288248e8f78b1c037bdfc903708326b149d2092974832a48651db5d0c3ed3b66156527d1a3b5bef87b01a03f11312d4d8a3eb1144508261a6ca2812d62
-
SSDEEP
12288:YDM3kEd7hjGpZU2P8n36ES4xPK4nn/ofJNNZUrLCF0ywx19KBM:97E3U/n3M4xPKUqFZQG5OHuM
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-