General
-
Target
1.exe
-
Size
2.6MB
-
Sample
240724-ychlfatdkj
-
MD5
d33fd82b32895cb0552b9c6dad9b3435
-
SHA1
a3117af86755a70fbaebdb2c8d27ac06e9dd777f
-
SHA256
af58caae16d4efcf211bdc1ab7830e6c27d5bce03e6fd2fd7c59901f40c75ce2
-
SHA512
fa72d7aebdf5e6b5e5d855a1f169854f82227490b18b573934f17a40ff5592a6a5d9364f2d9dc0da0200fdc1433fc104ada83bf75233860d51fc30af76ef248f
-
SSDEEP
49152:UbA30NVKXoZA5f48GoTA2fIirWmSIECusCjsAOoP2BTl4yJEmt:UbRVigA5w8Gx26XwCcztJEmt
Behavioral task
behavioral1
Sample
1.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
1.exe
Resource
win10v2004-20240709-en
Malware Config
Targets
-
-
Target
1.exe
-
Size
2.6MB
-
MD5
d33fd82b32895cb0552b9c6dad9b3435
-
SHA1
a3117af86755a70fbaebdb2c8d27ac06e9dd777f
-
SHA256
af58caae16d4efcf211bdc1ab7830e6c27d5bce03e6fd2fd7c59901f40c75ce2
-
SHA512
fa72d7aebdf5e6b5e5d855a1f169854f82227490b18b573934f17a40ff5592a6a5d9364f2d9dc0da0200fdc1433fc104ada83bf75233860d51fc30af76ef248f
-
SSDEEP
49152:UbA30NVKXoZA5f48GoTA2fIirWmSIECusCjsAOoP2BTl4yJEmt:UbRVigA5w8Gx26XwCcztJEmt
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-