General
-
Target
1182d9fec1b86ebb19739747de83243e.exe
-
Size
1.3MB
-
Sample
240708-kr54dsteke
-
MD5
1182d9fec1b86ebb19739747de83243e
-
SHA1
c187acb1a82c1e986b87cac0c34045fc4515a8f3
-
SHA256
14d3c791fbdb14120500093e49fa25a23bd7e9fec3e8f7065e8df3a326359d22
-
SHA512
fb9de8471b786844228f2c1c4d206f253767539347c999d2b7a37a9128eb2abd207e2f08a27afc853bdceee7bee4d92f7dec6d8db64c65d0d48fd3c014e4bb0b
-
SSDEEP
24576:kT3VQMmrjL/KL7168n0y2jKPkO/SLAYKR3ToqmE/kD4thm2:c6/yLv2OPkO/RYGeEuohm
Behavioral task
behavioral1
Sample
1182d9fec1b86ebb19739747de83243e.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1182d9fec1b86ebb19739747de83243e.exe
Resource
win10v2004-20240704-en
Malware Config
Targets
-
-
Target
1182d9fec1b86ebb19739747de83243e.exe
-
Size
1.3MB
-
MD5
1182d9fec1b86ebb19739747de83243e
-
SHA1
c187acb1a82c1e986b87cac0c34045fc4515a8f3
-
SHA256
14d3c791fbdb14120500093e49fa25a23bd7e9fec3e8f7065e8df3a326359d22
-
SHA512
fb9de8471b786844228f2c1c4d206f253767539347c999d2b7a37a9128eb2abd207e2f08a27afc853bdceee7bee4d92f7dec6d8db64c65d0d48fd3c014e4bb0b
-
SSDEEP
24576:kT3VQMmrjL/KL7168n0y2jKPkO/SLAYKR3ToqmE/kD4thm2:c6/yLv2OPkO/RYGeEuohm
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-