General
-
Target
bca88c932c62e07a93e63843fa98683c
-
Size
864KB
-
Sample
240409-3bfgxahd54
-
MD5
bca88c932c62e07a93e63843fa98683c
-
SHA1
a32de96450ead432f934752f1d654a6b904f8800
-
SHA256
5a76c4af4d3f402b6c5dbd4bdaf27fbce4f8c7dbeb37aa7360e2ef1412ecbf36
-
SHA512
d5d06c4306c9c6aa1f1485f35e8f074da7c92fbfcac34080802650d0e52123c729cbdf1c5736ea0eb5f83b2b43f907ca28a59ae2e139467e4c1596464370427c
-
SSDEEP
12288:frdd+xFusWBUS2uBLxvWluhvWYpWw1zuNuHP1YHUPnnCBao:pdiusWxpxvW+y8vqH8nvo
Behavioral task
behavioral1
Sample
bca88c932c62e07a93e63843fa98683c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bca88c932c62e07a93e63843fa98683c.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
bca88c932c62e07a93e63843fa98683c
-
Size
864KB
-
MD5
bca88c932c62e07a93e63843fa98683c
-
SHA1
a32de96450ead432f934752f1d654a6b904f8800
-
SHA256
5a76c4af4d3f402b6c5dbd4bdaf27fbce4f8c7dbeb37aa7360e2ef1412ecbf36
-
SHA512
d5d06c4306c9c6aa1f1485f35e8f074da7c92fbfcac34080802650d0e52123c729cbdf1c5736ea0eb5f83b2b43f907ca28a59ae2e139467e4c1596464370427c
-
SSDEEP
12288:frdd+xFusWBUS2uBLxvWluhvWYpWw1zuNuHP1YHUPnnCBao:pdiusWxpxvW+y8vqH8nvo
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-