General
-
Target
7ba95476622ca5f8425317a34bbab2b33755bcdb37bb9dcc5d933fc5859ca81f.exe
-
Size
1.1MB
-
Sample
240821-mk49matcja
-
MD5
198ba25ee66096e8560faa512dea17ce
-
SHA1
c2eb2e7f10b7d690b83193016f822780a073fcb3
-
SHA256
7ba95476622ca5f8425317a34bbab2b33755bcdb37bb9dcc5d933fc5859ca81f
-
SHA512
a42da424fcc2f8ec67f6d616e1f5f2ecb86d57f9bc1cfe91a06fa788f21e8b130f002896cc43dc2f36cff329a58c50b7b9fd98af912542025d43e22df199ad7b
-
SSDEEP
24576:59CwRt8HL7LJXzSmeSaT3VBdcFW2Xx37tOyp+:50wRt8zJAywyp
Behavioral task
behavioral1
Sample
7ba95476622ca5f8425317a34bbab2b33755bcdb37bb9dcc5d933fc5859ca81f.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
7ba95476622ca5f8425317a34bbab2b33755bcdb37bb9dcc5d933fc5859ca81f.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
7ba95476622ca5f8425317a34bbab2b33755bcdb37bb9dcc5d933fc5859ca81f.exe
-
Size
1.1MB
-
MD5
198ba25ee66096e8560faa512dea17ce
-
SHA1
c2eb2e7f10b7d690b83193016f822780a073fcb3
-
SHA256
7ba95476622ca5f8425317a34bbab2b33755bcdb37bb9dcc5d933fc5859ca81f
-
SHA512
a42da424fcc2f8ec67f6d616e1f5f2ecb86d57f9bc1cfe91a06fa788f21e8b130f002896cc43dc2f36cff329a58c50b7b9fd98af912542025d43e22df199ad7b
-
SSDEEP
24576:59CwRt8HL7LJXzSmeSaT3VBdcFW2Xx37tOyp+:50wRt8zJAywyp
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-