General
-
Target
47cabe63424ef65665ce7f0137f6fcf3.exe
-
Size
828KB
-
Sample
240726-pr1acsxgnr
-
MD5
47cabe63424ef65665ce7f0137f6fcf3
-
SHA1
cf85c975972f3e0959ab37575c171a0d194377d4
-
SHA256
0b37afa009e708ad8afad3ba00f5d7cd04e4befc807981922f6170cf4705080a
-
SHA512
5596d71c927f6f6203415ecec2e22a4a2bd2d2c4866bcb7372da55412cca891ed7bd823b1b9d6a03260177826f4565117c8746ea4277c6fdab2c4e6fd3f54dc8
-
SSDEEP
12288:qmxaXeD4VOwMacVHgZKMh3ZcO2iPfsgMMUO0R:SeD4VYVAZzH16
Behavioral task
behavioral1
Sample
47cabe63424ef65665ce7f0137f6fcf3.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
47cabe63424ef65665ce7f0137f6fcf3.exe
Resource
win10v2004-20240709-en
Malware Config
Targets
-
-
Target
47cabe63424ef65665ce7f0137f6fcf3.exe
-
Size
828KB
-
MD5
47cabe63424ef65665ce7f0137f6fcf3
-
SHA1
cf85c975972f3e0959ab37575c171a0d194377d4
-
SHA256
0b37afa009e708ad8afad3ba00f5d7cd04e4befc807981922f6170cf4705080a
-
SHA512
5596d71c927f6f6203415ecec2e22a4a2bd2d2c4866bcb7372da55412cca891ed7bd823b1b9d6a03260177826f4565117c8746ea4277c6fdab2c4e6fd3f54dc8
-
SSDEEP
12288:qmxaXeD4VOwMacVHgZKMh3ZcO2iPfsgMMUO0R:SeD4VYVAZzH16
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-