General
-
Target
b7c3123301aacc8aa43b3df96b2b4e00_NEIKI
-
Size
1.1MB
-
Sample
240509-bhkxeshh3v
-
MD5
b7c3123301aacc8aa43b3df96b2b4e00
-
SHA1
fddb84b2ebe7fd6c8d1de9db5433b1d682d8a77e
-
SHA256
f7e5f8da873729cb302bef684f53e65fb94bf0bcb74702cf9ef666be82feda93
-
SHA512
4f43f971f23efc38d1ab13a7b414f5c211d2154783444978d2c3e5c7a97295e8627f795b18b492396c6950c562de28fde76f5626e7dfc8b7ac3b3928c50a0bd8
-
SSDEEP
24576:6ADdteLS1VO6wLVqq0aJSw69voIN7y7Di0:cE86MVX/SwHmf
Behavioral task
behavioral1
Sample
b7c3123301aacc8aa43b3df96b2b4e00_NEIKI.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b7c3123301aacc8aa43b3df96b2b4e00_NEIKI.exe
Resource
win10v2004-20240426-en
Malware Config
Targets
-
-
Target
b7c3123301aacc8aa43b3df96b2b4e00_NEIKI
-
Size
1.1MB
-
MD5
b7c3123301aacc8aa43b3df96b2b4e00
-
SHA1
fddb84b2ebe7fd6c8d1de9db5433b1d682d8a77e
-
SHA256
f7e5f8da873729cb302bef684f53e65fb94bf0bcb74702cf9ef666be82feda93
-
SHA512
4f43f971f23efc38d1ab13a7b414f5c211d2154783444978d2c3e5c7a97295e8627f795b18b492396c6950c562de28fde76f5626e7dfc8b7ac3b3928c50a0bd8
-
SSDEEP
24576:6ADdteLS1VO6wLVqq0aJSw69voIN7y7Di0:cE86MVX/SwHmf
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-