General
-
Target
Electron.exe
-
Size
61KB
-
Sample
240530-ll2z8aeb92
-
MD5
1ce13e423f57888a68c3c544460b13a4
-
SHA1
eb98c3220428ea3e5bf391f330af1317c839d258
-
SHA256
e8f1e825cd1da794257a8f1f38f291835b31d45ded1cace17953b4a4f3bbf040
-
SHA512
eb0da239fec584754fc720b50cd1668684e4eadbe86f267b6285806c79c045fa657aaf9e97c8e27c967207105180251c5e13b7eb213fa067ad301d4af316accb
-
SSDEEP
768:5vcc1E6Deh+l8qctQuC4jCqD1uu2wZy1PNQF1DCVTs85ECgm8Azet8AtZ:dCh+Oqmq/p1PqF1DCNs+EXAzeyAtZ
Static task
static1
Behavioral task
behavioral1
Sample
Electron.exe
Resource
win11-20240508-en
Malware Config
Targets
-
-
Target
Electron.exe
-
Size
61KB
-
MD5
1ce13e423f57888a68c3c544460b13a4
-
SHA1
eb98c3220428ea3e5bf391f330af1317c839d258
-
SHA256
e8f1e825cd1da794257a8f1f38f291835b31d45ded1cace17953b4a4f3bbf040
-
SHA512
eb0da239fec584754fc720b50cd1668684e4eadbe86f267b6285806c79c045fa657aaf9e97c8e27c967207105180251c5e13b7eb213fa067ad301d4af316accb
-
SSDEEP
768:5vcc1E6Deh+l8qctQuC4jCqD1uu2wZy1PNQF1DCVTs85ECgm8Azet8AtZ:dCh+Oqmq/p1PqF1DCNs+EXAzeyAtZ
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Disables Task Manager via registry modification
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-