General
-
Target
759B333FD8D1EEDB5666FDEA1DA25B25.exe
-
Size
827KB
-
Sample
241027-xyr7bsyleq
-
MD5
759b333fd8d1eedb5666fdea1da25b25
-
SHA1
b66fc861196561f793062622b88cdb1065e35459
-
SHA256
7a1a3397249836cac73c5f104211fb6cbb2317c830c148a65acb709210aadd2e
-
SHA512
831006157773f5a30dbf07dcbfd484f49a978c077f8e132d33c8e044f8141462bb890c344724b23c3144488c1c406d576b7009c1205772a503ce6cc92692aec3
-
SSDEEP
12288:M+B2ad7F/Jf2xm1/nNfkOV+0Z3+5DlpAXdet4y5+q:gad7PuxmRn60Zu7xtZp
Behavioral task
behavioral1
Sample
759B333FD8D1EEDB5666FDEA1DA25B25.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
759B333FD8D1EEDB5666FDEA1DA25B25.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
759B333FD8D1EEDB5666FDEA1DA25B25.exe
-
Size
827KB
-
MD5
759b333fd8d1eedb5666fdea1da25b25
-
SHA1
b66fc861196561f793062622b88cdb1065e35459
-
SHA256
7a1a3397249836cac73c5f104211fb6cbb2317c830c148a65acb709210aadd2e
-
SHA512
831006157773f5a30dbf07dcbfd484f49a978c077f8e132d33c8e044f8141462bb890c344724b23c3144488c1c406d576b7009c1205772a503ce6cc92692aec3
-
SSDEEP
12288:M+B2ad7F/Jf2xm1/nNfkOV+0Z3+5DlpAXdet4y5+q:gad7PuxmRn60Zu7xtZp
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-