General
-
Target
8f1fc87e97923cc9f810b0893e2742c277992b6ca29f9a79e66c8f3938de5955N
-
Size
1.5MB
-
Sample
241105-cc8xqssbld
-
MD5
8f7fa3b34b52d77c923711a5b6510df0
-
SHA1
171914ec44b3bb7062f5b21bf5f628c9c1aa2b48
-
SHA256
8f1fc87e97923cc9f810b0893e2742c277992b6ca29f9a79e66c8f3938de5955
-
SHA512
68d82717828e8ed1598e8599c39b0898bd7f4a11fadf232e5cc58ffd21028fa61ac351f0dc9135ecbe7a42758ec301a73ac4c06c3c3678c7ecb0d2837a756d63
-
SSDEEP
24576:0eaMajUi+6C+mDjn7gbkFaSH7Wu4mIWGE1Sy/fBEXTHhaTEEER71RM4I13:0eaj9bHmMbkBHVdGE1Sy/ujhaIh+1
Behavioral task
behavioral1
Sample
8f1fc87e97923cc9f810b0893e2742c277992b6ca29f9a79e66c8f3938de5955N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8f1fc87e97923cc9f810b0893e2742c277992b6ca29f9a79e66c8f3938de5955N.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
8f1fc87e97923cc9f810b0893e2742c277992b6ca29f9a79e66c8f3938de5955N
-
Size
1.5MB
-
MD5
8f7fa3b34b52d77c923711a5b6510df0
-
SHA1
171914ec44b3bb7062f5b21bf5f628c9c1aa2b48
-
SHA256
8f1fc87e97923cc9f810b0893e2742c277992b6ca29f9a79e66c8f3938de5955
-
SHA512
68d82717828e8ed1598e8599c39b0898bd7f4a11fadf232e5cc58ffd21028fa61ac351f0dc9135ecbe7a42758ec301a73ac4c06c3c3678c7ecb0d2837a756d63
-
SSDEEP
24576:0eaMajUi+6C+mDjn7gbkFaSH7Wu4mIWGE1Sy/fBEXTHhaTEEER71RM4I13:0eaj9bHmMbkBHVdGE1Sy/ujhaIh+1
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-