General
-
Target
51ED2A0701D313F3761169D91FB69848.exe
-
Size
2.4MB
-
Sample
241102-t9y78ssnhj
-
MD5
51ed2a0701d313f3761169d91fb69848
-
SHA1
ed39a76db78d1d3c9c3a3a20d5dcf8da19e51ba3
-
SHA256
1b304c8a2ae4546bd7958c7f22becaf6b682a5c88b7a01945a952de991b0ef0b
-
SHA512
324bb255f7b5edef459ca8c5ec88509cd86f0fc060c546c9484294db5c97bcd56d0483b0074d63763f85fea0807ed2b3e10fb7749c797e0ea3d511382dd0be85
-
SSDEEP
49152:3XfX30/e4wkPaOoMoa+QPPHPahen4S2V526is7K9gn6weB1din4OEU6zMa:nf0/e47aOoMcQP6M4S+4676P3wn4dz
Static task
static1
Behavioral task
behavioral1
Sample
51ED2A0701D313F3761169D91FB69848.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
51ED2A0701D313F3761169D91FB69848.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
51ED2A0701D313F3761169D91FB69848.exe
-
Size
2.4MB
-
MD5
51ed2a0701d313f3761169d91fb69848
-
SHA1
ed39a76db78d1d3c9c3a3a20d5dcf8da19e51ba3
-
SHA256
1b304c8a2ae4546bd7958c7f22becaf6b682a5c88b7a01945a952de991b0ef0b
-
SHA512
324bb255f7b5edef459ca8c5ec88509cd86f0fc060c546c9484294db5c97bcd56d0483b0074d63763f85fea0807ed2b3e10fb7749c797e0ea3d511382dd0be85
-
SSDEEP
49152:3XfX30/e4wkPaOoMoa+QPPHPahen4S2V526is7K9gn6weB1din4OEU6zMa:nf0/e47aOoMcQP6M4S+4676P3wn4dz
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Disables Task Manager via registry modification
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-