General
-
Target
DCRatBuild.exe
-
Size
1.3MB
-
Sample
240612-z3zs3szhpe
-
MD5
439cb5cb55ef43db9a6bf3e7f5a7c41f
-
SHA1
fae1f5208d38d198c1c4abdee68b428c84336f11
-
SHA256
4d904132b607fffcc8b3c537e7122cb0bec8303a7600d1bc454cfc6162dedd87
-
SHA512
905bc57781b1950051103f67959df7d1b2ff53d7a773ea0730b80a2024bac0622c9301dd94910275d2a3a84be1c38585d4a0956c1ad17475d67167f523c7acd4
-
SSDEEP
24576:u2G/nvxW3WieCa57VWTeHT4RIQFy4zZHWdd05g18f:ubA3jaXFwIbd05g1+
Behavioral task
behavioral1
Sample
DCRatBuild.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
DCRatBuild.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
DCRatBuild.exe
-
Size
1.3MB
-
MD5
439cb5cb55ef43db9a6bf3e7f5a7c41f
-
SHA1
fae1f5208d38d198c1c4abdee68b428c84336f11
-
SHA256
4d904132b607fffcc8b3c537e7122cb0bec8303a7600d1bc454cfc6162dedd87
-
SHA512
905bc57781b1950051103f67959df7d1b2ff53d7a773ea0730b80a2024bac0622c9301dd94910275d2a3a84be1c38585d4a0956c1ad17475d67167f523c7acd4
-
SSDEEP
24576:u2G/nvxW3WieCa57VWTeHT4RIQFy4zZHWdd05g18f:ubA3jaXFwIbd05g1+
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-