General
-
Target
F7361ED3503F11A56E8CC53AD6C277B8.exe
-
Size
1.2MB
-
Sample
241030-v288xaxkb1
-
MD5
f7361ed3503f11a56e8cc53ad6c277b8
-
SHA1
bfa62d30d715bf866d5a2a6198a474c316b3dc04
-
SHA256
a64e0fad64514c66bc6750432d8c3ef96932f9902886f540cca217031d1cfc44
-
SHA512
9828478b57e85a2341262127e3149f5a9e48523198665b99634738627f107c1f5ab0c30ad80819bd9c4920836585397f4caef83c6d955cca6f0074b212fa96a4
-
SSDEEP
24576:q2G/nvxW3WXlB6Fh3rXTamAQ8uwoqTWy1Y7i887KtU:qbA3q4h3rD5DiT1T2O
Behavioral task
behavioral1
Sample
F7361ED3503F11A56E8CC53AD6C277B8.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
F7361ED3503F11A56E8CC53AD6C277B8.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
F7361ED3503F11A56E8CC53AD6C277B8.exe
-
Size
1.2MB
-
MD5
f7361ed3503f11a56e8cc53ad6c277b8
-
SHA1
bfa62d30d715bf866d5a2a6198a474c316b3dc04
-
SHA256
a64e0fad64514c66bc6750432d8c3ef96932f9902886f540cca217031d1cfc44
-
SHA512
9828478b57e85a2341262127e3149f5a9e48523198665b99634738627f107c1f5ab0c30ad80819bd9c4920836585397f4caef83c6d955cca6f0074b212fa96a4
-
SSDEEP
24576:q2G/nvxW3WXlB6Fh3rXTamAQ8uwoqTWy1Y7i887KtU:qbA3q4h3rD5DiT1T2O
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-