General
-
Target
5cf6fb2fd47e964237692b36bdb37b5e5d8eea7006d1578568c8282320bb77a9N
-
Size
1.3MB
-
Sample
241105-gaj8tawamc
-
MD5
577b7949ddeffc75751b24086b24bdc0
-
SHA1
fcf6f523c69daaf3625b110e7f1f3038e99b4b7e
-
SHA256
5cf6fb2fd47e964237692b36bdb37b5e5d8eea7006d1578568c8282320bb77a9
-
SHA512
91054af8e4f831b13bf778852f3364f4982e9a7c08632ef5972d57b6916ca7a4341799349ccf91a73f75d0ad2641356e9ddc6802505ff9f09720952f4a018d75
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
5cf6fb2fd47e964237692b36bdb37b5e5d8eea7006d1578568c8282320bb77a9N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5cf6fb2fd47e964237692b36bdb37b5e5d8eea7006d1578568c8282320bb77a9N.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
5cf6fb2fd47e964237692b36bdb37b5e5d8eea7006d1578568c8282320bb77a9N
-
Size
1.3MB
-
MD5
577b7949ddeffc75751b24086b24bdc0
-
SHA1
fcf6f523c69daaf3625b110e7f1f3038e99b4b7e
-
SHA256
5cf6fb2fd47e964237692b36bdb37b5e5d8eea7006d1578568c8282320bb77a9
-
SHA512
91054af8e4f831b13bf778852f3364f4982e9a7c08632ef5972d57b6916ca7a4341799349ccf91a73f75d0ad2641356e9ddc6802505ff9f09720952f4a018d75
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-