General
-
Target
ab1c4b2064c842b2f0afbda8ce7506b0_NEIKI
-
Size
1.1MB
-
Sample
240508-c4tl5aed2t
-
MD5
ab1c4b2064c842b2f0afbda8ce7506b0
-
SHA1
7da3a31c10136b18042a79d436d30670ec2afa37
-
SHA256
5fae2c434c6a15b0c29c85a40f897ed061cd31d7edc552ef0538de64a1605668
-
SHA512
7151398876b7f469957ce490f320765052d1b25e298ebf168af3390d751e60af5b192771eeb8ebac53ab4aa01da67a9e927ef360d2a0004418d1db6af78a5779
-
SSDEEP
24576:U2G/nvxW3Ww0tbHBCEAPmIcBTOXeVbBdRRM0fOn:UbA30TBimxOkxs
Behavioral task
behavioral1
Sample
ab1c4b2064c842b2f0afbda8ce7506b0_NEIKI.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ab1c4b2064c842b2f0afbda8ce7506b0_NEIKI.exe
Resource
win10v2004-20240426-en
Malware Config
Targets
-
-
Target
ab1c4b2064c842b2f0afbda8ce7506b0_NEIKI
-
Size
1.1MB
-
MD5
ab1c4b2064c842b2f0afbda8ce7506b0
-
SHA1
7da3a31c10136b18042a79d436d30670ec2afa37
-
SHA256
5fae2c434c6a15b0c29c85a40f897ed061cd31d7edc552ef0538de64a1605668
-
SHA512
7151398876b7f469957ce490f320765052d1b25e298ebf168af3390d751e60af5b192771eeb8ebac53ab4aa01da67a9e927ef360d2a0004418d1db6af78a5779
-
SSDEEP
24576:U2G/nvxW3Ww0tbHBCEAPmIcBTOXeVbBdRRM0fOn:UbA30TBimxOkxs
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-