General
-
Target
Screamer_by_LuckyKazya.exe
-
Size
8.2MB
-
Sample
240817-hjy9rswamn
-
MD5
5293cd34f1929a6aef0d11a71bed6384
-
SHA1
2c8799dacba9e2d7d3d906b135643746aea72efa
-
SHA256
ae00a9c7d4ac7331cf5281e36893cfad2bca070e3717417312651bf7ed8a4f1e
-
SHA512
965b1452805d8613ba682e9af3700aff3caa2e17f32f306e93cb0e7c3b29a6f373c387debe34cbab743d32454d67b37792e9003378d3786471cf74d11d2308ab
-
SSDEEP
196608:DUNMxGQlgbejzAuiT28sNlL9/RiamGH6bteUYpSsha2O:DUN8NlgbejzziTFm9/REc6bEZpSsO
Static task
static1
Behavioral task
behavioral1
Sample
Screamer_by_LuckyKazya.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
Screamer_by_LuckyKazya.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
Screamer_by_LuckyKazya.exe
-
Size
8.2MB
-
MD5
5293cd34f1929a6aef0d11a71bed6384
-
SHA1
2c8799dacba9e2d7d3d906b135643746aea72efa
-
SHA256
ae00a9c7d4ac7331cf5281e36893cfad2bca070e3717417312651bf7ed8a4f1e
-
SHA512
965b1452805d8613ba682e9af3700aff3caa2e17f32f306e93cb0e7c3b29a6f373c387debe34cbab743d32454d67b37792e9003378d3786471cf74d11d2308ab
-
SSDEEP
196608:DUNMxGQlgbejzAuiT28sNlL9/RiamGH6bteUYpSsha2O:DUN8NlgbejzziTFm9/REc6bEZpSsO
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-