General
-
Target
7d8db13b60e52fa8f795d68381eb2317.exe
-
Size
827KB
-
Sample
241104-lvgqmsyfkk
-
MD5
7d8db13b60e52fa8f795d68381eb2317
-
SHA1
cf815f00bf53482199124c6fed99c487f85e1d6e
-
SHA256
f0ac345cd615b9233b1436e380a0130863da5945f7a73a24877210a9ad4bc805
-
SHA512
d41f783a057e022bce577b4f90e6f031b86ba459856a532f75fb2a2405c1c30c589afa945278fe30a6b7e2b6115b5aca7756a791556d1f82b959dc06c6435768
-
SSDEEP
12288:i89kbsLqJ5RqavS3UCBe41kBEsIPtvz4OerNHcaMXb:w4LqJ5RqZ3UCBeYRbTexH8Xb
Behavioral task
behavioral1
Sample
7d8db13b60e52fa8f795d68381eb2317.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7d8db13b60e52fa8f795d68381eb2317.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
7d8db13b60e52fa8f795d68381eb2317.exe
-
Size
827KB
-
MD5
7d8db13b60e52fa8f795d68381eb2317
-
SHA1
cf815f00bf53482199124c6fed99c487f85e1d6e
-
SHA256
f0ac345cd615b9233b1436e380a0130863da5945f7a73a24877210a9ad4bc805
-
SHA512
d41f783a057e022bce577b4f90e6f031b86ba459856a532f75fb2a2405c1c30c589afa945278fe30a6b7e2b6115b5aca7756a791556d1f82b959dc06c6435768
-
SSDEEP
12288:i89kbsLqJ5RqavS3UCBe41kBEsIPtvz4OerNHcaMXb:w4LqJ5RqZ3UCBeYRbTexH8Xb
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-