General
-
Target
pwxz driver + km.exe
-
Size
1.1MB
-
Sample
241108-n8e53svjdm
-
MD5
f98e6472238ac5d8686545a0d48d176b
-
SHA1
927fa5aff827297e7bbc991b6bc573f4cf6d9945
-
SHA256
b4378b93df9c53cfb65f83695e4a68c3eceb87c49eef02ee45b85128f967e381
-
SHA512
231b45a7c636a5d8dc6a805d7a9da61308f159540b74796e8a11329fe90ed0f72ad88e5104781156f1ff36403b1bb131e83030fef2e37cf9c139d32194d5817e
-
SSDEEP
24576:jfANwLwUvInQgVXu9QdasS+9zxocWbnw0GcV73Fd:jfYwSnZAQdasS+Ecod
Static task
static1
Behavioral task
behavioral1
Sample
pwxz driver + km.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
pwxz driver + km.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
pwxz driver + km.exe
-
Size
1.1MB
-
MD5
f98e6472238ac5d8686545a0d48d176b
-
SHA1
927fa5aff827297e7bbc991b6bc573f4cf6d9945
-
SHA256
b4378b93df9c53cfb65f83695e4a68c3eceb87c49eef02ee45b85128f967e381
-
SHA512
231b45a7c636a5d8dc6a805d7a9da61308f159540b74796e8a11329fe90ed0f72ad88e5104781156f1ff36403b1bb131e83030fef2e37cf9c139d32194d5817e
-
SSDEEP
24576:jfANwLwUvInQgVXu9QdasS+9zxocWbnw0GcV73Fd:jfYwSnZAQdasS+Ecod
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-