General
-
Target
acbf2913aa4a2385d29179f5a9c0add2fff6bb34adab4669d02793a5c1317cc9.exe
-
Size
1.1MB
-
Sample
241003-cc32gsydnn
-
MD5
2b577aea211c0031d052f521c6d5c0ec
-
SHA1
7cf36171d6c2dae4646132b6ebafd00bf6a38892
-
SHA256
acbf2913aa4a2385d29179f5a9c0add2fff6bb34adab4669d02793a5c1317cc9
-
SHA512
c6d925af572352dc833168d03917ded04d0f932ef7e92c398287b9945eb2edf8bb6073c346b09ae1fe0197134b5bbdda5bc8b241541d5f88f8161174700731f6
-
SSDEEP
24576:B2G/nvxW3Wfn9lYiD2UQCmkcJJ1iul2LTK8R+TBPu:BbA3e9l5Dvmkqi02eW
Behavioral task
behavioral1
Sample
acbf2913aa4a2385d29179f5a9c0add2fff6bb34adab4669d02793a5c1317cc9.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
acbf2913aa4a2385d29179f5a9c0add2fff6bb34adab4669d02793a5c1317cc9.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
acbf2913aa4a2385d29179f5a9c0add2fff6bb34adab4669d02793a5c1317cc9.exe
-
Size
1.1MB
-
MD5
2b577aea211c0031d052f521c6d5c0ec
-
SHA1
7cf36171d6c2dae4646132b6ebafd00bf6a38892
-
SHA256
acbf2913aa4a2385d29179f5a9c0add2fff6bb34adab4669d02793a5c1317cc9
-
SHA512
c6d925af572352dc833168d03917ded04d0f932ef7e92c398287b9945eb2edf8bb6073c346b09ae1fe0197134b5bbdda5bc8b241541d5f88f8161174700731f6
-
SSDEEP
24576:B2G/nvxW3Wfn9lYiD2UQCmkcJJ1iul2LTK8R+TBPu:BbA3e9l5Dvmkqi02eW
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-