General
-
Target
fce441edb227275c5380194cc7a96a95998de6d75cd601b73bce1be529a68bd6.exe
-
Size
827KB
-
Sample
240817-b72apstdrl
-
MD5
73c1c41b9e71c48e752a5cd19fe808b6
-
SHA1
b8bd41a0b9dc7baef6eb01dfe6c852afdfaeed18
-
SHA256
fce441edb227275c5380194cc7a96a95998de6d75cd601b73bce1be529a68bd6
-
SHA512
f146a8917d39aa29d52386f5a23bbc01fbfade291d576782b5cc80b0ca363fa24fee80f00cf81ffa40e12503fedd203b422b7ad97dbb0d4500152e86d974cb38
-
SSDEEP
12288:JU3eNRedfgcpnS+rRBhJrppyCgDDJnqem1VC/Ucg:WuNRedfgl+rRBPwFqemEUcg
Behavioral task
behavioral1
Sample
fce441edb227275c5380194cc7a96a95998de6d75cd601b73bce1be529a68bd6.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
fce441edb227275c5380194cc7a96a95998de6d75cd601b73bce1be529a68bd6.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
fce441edb227275c5380194cc7a96a95998de6d75cd601b73bce1be529a68bd6.exe
-
Size
827KB
-
MD5
73c1c41b9e71c48e752a5cd19fe808b6
-
SHA1
b8bd41a0b9dc7baef6eb01dfe6c852afdfaeed18
-
SHA256
fce441edb227275c5380194cc7a96a95998de6d75cd601b73bce1be529a68bd6
-
SHA512
f146a8917d39aa29d52386f5a23bbc01fbfade291d576782b5cc80b0ca363fa24fee80f00cf81ffa40e12503fedd203b422b7ad97dbb0d4500152e86d974cb38
-
SSDEEP
12288:JU3eNRedfgcpnS+rRBhJrppyCgDDJnqem1VC/Ucg:WuNRedfgl+rRBPwFqemEUcg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-