General
-
Target
1b3401b9808d6317bedeeee1e11fe670N.exe
-
Size
547KB
-
Sample
240814-l4hdja1dlp
-
MD5
1b3401b9808d6317bedeeee1e11fe670
-
SHA1
29e89485456344805d4d26f97ef39b6c692486fd
-
SHA256
e4553879ba20a82e36da049c0222a53960c0e66b4276166caf896e78bf91787a
-
SHA512
cff17c6321fc2d1ace0c98fdcbf8b06a2a7677525c7f42f271649f8dd5c70f2e86985e0091b1cec65e5651729b09fbde41cb607bc9472247f4e31939e520f8d8
-
SSDEEP
12288:RG2N7k4NxZU4TP1gCdx6g8q+yq8ZLfEPI9iTO1x:RG2jDBP1Hx6bIgK
Behavioral task
behavioral1
Sample
1b3401b9808d6317bedeeee1e11fe670N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
1b3401b9808d6317bedeeee1e11fe670N.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
1b3401b9808d6317bedeeee1e11fe670N.exe
-
Size
547KB
-
MD5
1b3401b9808d6317bedeeee1e11fe670
-
SHA1
29e89485456344805d4d26f97ef39b6c692486fd
-
SHA256
e4553879ba20a82e36da049c0222a53960c0e66b4276166caf896e78bf91787a
-
SHA512
cff17c6321fc2d1ace0c98fdcbf8b06a2a7677525c7f42f271649f8dd5c70f2e86985e0091b1cec65e5651729b09fbde41cb607bc9472247f4e31939e520f8d8
-
SSDEEP
12288:RG2N7k4NxZU4TP1gCdx6g8q+yq8ZLfEPI9iTO1x:RG2jDBP1Hx6bIgK
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-