General
-
Target
c290ad62817046fb9f21fecf38ec7da631f48e9dd7b3aba5ab17e9fe51ea9966N
-
Size
575KB
-
Sample
241109-w1wf4azbrc
-
MD5
21110bdf3a234f15f6f7523aa0fa0e90
-
SHA1
50f8de3658915f7967042f071a95522866d149f9
-
SHA256
c290ad62817046fb9f21fecf38ec7da631f48e9dd7b3aba5ab17e9fe51ea9966
-
SHA512
6c61cb2c3fae5ba1511ec2ef468d54240fd428834495fba919a91e90a7d00cbff0868e65b3d29f08327244b2c6e1b369bbb4b3acddde1b5a7156bf87be575c50
-
SSDEEP
12288:QgBHXRtrPBInYtSsnadym2jO+Aem8kAuW3f:DjJPB0sn4AV3
Static task
static1
Behavioral task
behavioral1
Sample
c290ad62817046fb9f21fecf38ec7da631f48e9dd7b3aba5ab17e9fe51ea9966N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c290ad62817046fb9f21fecf38ec7da631f48e9dd7b3aba5ab17e9fe51ea9966N.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
lumma
https://strappystyio.shop/api
https://coursedonnyre.shop/api
https://fossillargeiw.shop/api
https://tendencerangej.shop/api
https://appleboltelwk.shop/api
https://tearrybyiwo.shop/api
https://captainynfanw.shop/api
https://surveriysiop.shop/api
https://tiddymarktwo.shop/api
Targets
-
-
Target
c290ad62817046fb9f21fecf38ec7da631f48e9dd7b3aba5ab17e9fe51ea9966N
-
Size
575KB
-
MD5
21110bdf3a234f15f6f7523aa0fa0e90
-
SHA1
50f8de3658915f7967042f071a95522866d149f9
-
SHA256
c290ad62817046fb9f21fecf38ec7da631f48e9dd7b3aba5ab17e9fe51ea9966
-
SHA512
6c61cb2c3fae5ba1511ec2ef468d54240fd428834495fba919a91e90a7d00cbff0868e65b3d29f08327244b2c6e1b369bbb4b3acddde1b5a7156bf87be575c50
-
SSDEEP
12288:QgBHXRtrPBInYtSsnadym2jO+Aem8kAuW3f:DjJPB0sn4AV3
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Lumma family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-