General
-
Target
5614b417cca4217b0a1a4a4a081f9f43.exe
-
Size
831KB
-
Sample
240823-ntfs3a1hkh
-
MD5
5614b417cca4217b0a1a4a4a081f9f43
-
SHA1
6597f30054da2fcea4f5c37121a0581b1a93781b
-
SHA256
0993c5335a17f17141e1be3f1936fa420e69c33bebedcd39d01bc527f6cd7d96
-
SHA512
bed2ed22e5759aa7d4beac74d0b3cfaf7a045c70dc3ab97c490b978a365b741fd6257a64cf3cdf3f0653febd1176cd5278e57347dbc11d55c9513aa2c7777e12
-
SSDEEP
12288:xmhMcbVbcxC9wcb8QyKJT2ediDP78OK1CALBuMOh7x:xmRVbcxCWKyKJT2Z4xi
Behavioral task
behavioral1
Sample
5614b417cca4217b0a1a4a4a081f9f43.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
5614b417cca4217b0a1a4a4a081f9f43.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
5614b417cca4217b0a1a4a4a081f9f43.exe
-
Size
831KB
-
MD5
5614b417cca4217b0a1a4a4a081f9f43
-
SHA1
6597f30054da2fcea4f5c37121a0581b1a93781b
-
SHA256
0993c5335a17f17141e1be3f1936fa420e69c33bebedcd39d01bc527f6cd7d96
-
SHA512
bed2ed22e5759aa7d4beac74d0b3cfaf7a045c70dc3ab97c490b978a365b741fd6257a64cf3cdf3f0653febd1176cd5278e57347dbc11d55c9513aa2c7777e12
-
SSDEEP
12288:xmhMcbVbcxC9wcb8QyKJT2ediDP78OK1CALBuMOh7x:xmRVbcxCWKyKJT2Z4xi
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-