General
-
Target
4f0a0a77c8473028b724fcd4431a5128.exe
-
Size
2.6MB
-
Sample
240417-en8gfsdc63
-
MD5
4f0a0a77c8473028b724fcd4431a5128
-
SHA1
af1705bf6b02cb0ccc703ebaa55c4ea8c07cb968
-
SHA256
7c0217b4f09d7b5eb5a087c45aed6d13fca45ec3be6e32df510a9ad9a71d6c1a
-
SHA512
cc11e25588c72f9fed049c8b082dbe13a945b988b397ce9762b486b5c0da1cb1a2c93b5af441a13f3790556b35ccb20e4b9a750d8cb387c88a6934ea9243ef68
-
SSDEEP
49152:OUK2oQKwtABwKO+0QIvoY3jFx3KNQ8qd28ZaQcULQ45i+PynH4L:OaoQXKfNNYzbaNEdZSeTynY
Behavioral task
behavioral1
Sample
4f0a0a77c8473028b724fcd4431a5128.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
4f0a0a77c8473028b724fcd4431a5128.exe
Resource
win10v2004-20240412-en
Malware Config
Targets
-
-
Target
4f0a0a77c8473028b724fcd4431a5128.exe
-
Size
2.6MB
-
MD5
4f0a0a77c8473028b724fcd4431a5128
-
SHA1
af1705bf6b02cb0ccc703ebaa55c4ea8c07cb968
-
SHA256
7c0217b4f09d7b5eb5a087c45aed6d13fca45ec3be6e32df510a9ad9a71d6c1a
-
SHA512
cc11e25588c72f9fed049c8b082dbe13a945b988b397ce9762b486b5c0da1cb1a2c93b5af441a13f3790556b35ccb20e4b9a750d8cb387c88a6934ea9243ef68
-
SSDEEP
49152:OUK2oQKwtABwKO+0QIvoY3jFx3KNQ8qd28ZaQcULQ45i+PynH4L:OaoQXKfNNYzbaNEdZSeTynY
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-