General
-
Target
3d41c790a5c6b1af06c653b594220d0a.exe
-
Size
827KB
-
Sample
240809-js1dvssble
-
MD5
3d41c790a5c6b1af06c653b594220d0a
-
SHA1
43ca0c57f6dd7acac229c4ad7ba252ea05cbd34f
-
SHA256
b77803bc0499683c46db2da3505ac95ec64097a1021971e6c6b4d40503db4b15
-
SHA512
44eb413c8265acee17e9973102f67240f978b19a902758051263e594b04d40e40f6543ada8f3ef5991049ccd9b8741c840c9792f2b4bf83228c1aeedd18c9f5d
-
SSDEEP
12288:VGyS8jpLUezD2BpaNl498Ov7gcBy5w64vJx6ARRNXzfzeII:V+kLUez+pWl498O0CE4hxhRDz7M
Behavioral task
behavioral1
Sample
3d41c790a5c6b1af06c653b594220d0a.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
3d41c790a5c6b1af06c653b594220d0a.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
3d41c790a5c6b1af06c653b594220d0a.exe
-
Size
827KB
-
MD5
3d41c790a5c6b1af06c653b594220d0a
-
SHA1
43ca0c57f6dd7acac229c4ad7ba252ea05cbd34f
-
SHA256
b77803bc0499683c46db2da3505ac95ec64097a1021971e6c6b4d40503db4b15
-
SHA512
44eb413c8265acee17e9973102f67240f978b19a902758051263e594b04d40e40f6543ada8f3ef5991049ccd9b8741c840c9792f2b4bf83228c1aeedd18c9f5d
-
SSDEEP
12288:VGyS8jpLUezD2BpaNl498Ov7gcBy5w64vJx6ARRNXzfzeII:V+kLUez+pWl498O0CE4hxhRDz7M
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-