General
-
Target
f6fffabc85ab9bfd39576690b7107ddc421d458f6021a754a0b69969ba6e51cfN
-
Size
1.2MB
-
Sample
241107-lya29szfkg
-
MD5
d3b579a658327ea6b0b270989961d4a0
-
SHA1
4f973046dd649eb484960bb5decdcb1854eb759a
-
SHA256
f6fffabc85ab9bfd39576690b7107ddc421d458f6021a754a0b69969ba6e51cf
-
SHA512
0ed2079276cef4e973e2b0166f4f57ce124c43d2d866a772c78a8a801458256fdb1d233cb0a047dd2e8ee6b09ab66505f75073ed241f73f9944d14078b5d4468
-
SSDEEP
24576:v+r+6mj4wnm4qDfidSA440wOkTM5lcQANNVRIQPc2UWab:v++6mJqDuQd52QANNVRIQ8
Behavioral task
behavioral1
Sample
f6fffabc85ab9bfd39576690b7107ddc421d458f6021a754a0b69969ba6e51cfN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f6fffabc85ab9bfd39576690b7107ddc421d458f6021a754a0b69969ba6e51cfN.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
f6fffabc85ab9bfd39576690b7107ddc421d458f6021a754a0b69969ba6e51cfN
-
Size
1.2MB
-
MD5
d3b579a658327ea6b0b270989961d4a0
-
SHA1
4f973046dd649eb484960bb5decdcb1854eb759a
-
SHA256
f6fffabc85ab9bfd39576690b7107ddc421d458f6021a754a0b69969ba6e51cf
-
SHA512
0ed2079276cef4e973e2b0166f4f57ce124c43d2d866a772c78a8a801458256fdb1d233cb0a047dd2e8ee6b09ab66505f75073ed241f73f9944d14078b5d4468
-
SSDEEP
24576:v+r+6mj4wnm4qDfidSA440wOkTM5lcQANNVRIQPc2UWab:v++6mJqDuQd52QANNVRIQ8
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-