General
-
Target
d9e0f300d171bc4c1eae1e04bc3411f86cbb616b1e98271c845ad35b81e8c240
-
Size
415KB
-
Sample
240417-rbg5ysah45
-
MD5
be61c522413ec7b21c40fd0aea35fc91
-
SHA1
e40523c0fbaba4eb42bb043f97836a0cfaa15c4f
-
SHA256
d9e0f300d171bc4c1eae1e04bc3411f86cbb616b1e98271c845ad35b81e8c240
-
SHA512
52f56a77339d13a1d6b21881a52d5aed9c1aa89b2daaeffa8fef828cbad5902171d8a4259e4483e6fc08e4d746109e9d30fcecfc9cd88ec89bd7d2f04253fd90
-
SSDEEP
12288:nkI490t5LVDzL3LD1Rt45rIn8gh+dBrUmA:nkI490H5L3LD1RtsO5hIBrUmA
Behavioral task
behavioral1
Sample
5de166439e50ddf65e251538313e9dc29eab58929e6735d70385615f7fcf4f70.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5de166439e50ddf65e251538313e9dc29eab58929e6735d70385615f7fcf4f70.exe
Resource
win10v2004-20240412-en
Malware Config
Targets
-
-
Target
5de166439e50ddf65e251538313e9dc29eab58929e6735d70385615f7fcf4f70.exe
-
Size
828KB
-
MD5
125ef93b1d3162aede8c49768d1c9007
-
SHA1
9f6fa10e4c480aa1032eadb3d8f3b795f43e0f8d
-
SHA256
5de166439e50ddf65e251538313e9dc29eab58929e6735d70385615f7fcf4f70
-
SHA512
432f424544d3e2c87c4855c2d35a99009948534b3a1a81845cdbfca22b3ffb1686692688c307b0803c45acbe17bef849724019c541e204dac22a74405a9bc788
-
SSDEEP
12288:vsrUaYHLogEUDklbcUG8TlMvZKjFZO1BgeqfUyojUxVd4Rr+7PNB:GgEUAbBQKjrSJq8yojUiRrGNB
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-