General
-
Target
d6f4814f6bf4d7cbe9cc70904df3e9ca02c189576883f35eb6e19ab193508e32
-
Size
415KB
-
Sample
240417-rbe1laah43
-
MD5
5d1016e92807a0396206e9ba9483728b
-
SHA1
8401738fe5b09145aad5c970d15a0f0f0706597b
-
SHA256
d6f4814f6bf4d7cbe9cc70904df3e9ca02c189576883f35eb6e19ab193508e32
-
SHA512
cc8beab05e418fd15cfd581133e538e92e00c96e4c2e10492fa65081b02a78c4b9e0c64cebb1b22f246fb387a8b81b6a935341db5dd4b365d9ec0bfc18538942
-
SSDEEP
12288:S+SYlpBLNx19l4ngoz7MdopamzPdq0EVEd:AYl3pr9MgmMupbzo0EVEd
Behavioral task
behavioral1
Sample
5de166439e50ddf65e251538313e9dc29eab58929e6735d70385615f7fcf4f70.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5de166439e50ddf65e251538313e9dc29eab58929e6735d70385615f7fcf4f70.exe
Resource
win10v2004-20240412-en
Malware Config
Targets
-
-
Target
5de166439e50ddf65e251538313e9dc29eab58929e6735d70385615f7fcf4f70.exe
-
Size
828KB
-
MD5
125ef93b1d3162aede8c49768d1c9007
-
SHA1
9f6fa10e4c480aa1032eadb3d8f3b795f43e0f8d
-
SHA256
5de166439e50ddf65e251538313e9dc29eab58929e6735d70385615f7fcf4f70
-
SHA512
432f424544d3e2c87c4855c2d35a99009948534b3a1a81845cdbfca22b3ffb1686692688c307b0803c45acbe17bef849724019c541e204dac22a74405a9bc788
-
SSDEEP
12288:vsrUaYHLogEUDklbcUG8TlMvZKjFZO1BgeqfUyojUxVd4Rr+7PNB:GgEUAbBQKjrSJq8yojUiRrGNB
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-