General
-
Target
d4a31dc5744b566f097f20ee18f55acedec23a55117c88e3cca8d65d8f4020beN
-
Size
1.5MB
-
Sample
241110-ljbp9axlfm
-
MD5
f98b8d957e56a925bdfe1a9ed6182860
-
SHA1
c30bd13e13837e96f0affe38dc3603d978c20d91
-
SHA256
d4a31dc5744b566f097f20ee18f55acedec23a55117c88e3cca8d65d8f4020be
-
SHA512
7766fe75347bca80d4754f1e7eebdafb134de91491e94f951b5a22ae27a62d7015f5c6c326aeb6ab65cd8f176e4f8ba355f11751b4685c5c1d60765526ed6111
-
SSDEEP
24576:ceaMajUi+6C+mDjn7gbkFaSH7Wu4mIWGE1Sy/fBEXTHhaTEEER71RM4I13:ceaj9bHmMbkBHVdGE1Sy/ujhaIh+1
Behavioral task
behavioral1
Sample
d4a31dc5744b566f097f20ee18f55acedec23a55117c88e3cca8d65d8f4020beN.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
d4a31dc5744b566f097f20ee18f55acedec23a55117c88e3cca8d65d8f4020beN.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
d4a31dc5744b566f097f20ee18f55acedec23a55117c88e3cca8d65d8f4020beN
-
Size
1.5MB
-
MD5
f98b8d957e56a925bdfe1a9ed6182860
-
SHA1
c30bd13e13837e96f0affe38dc3603d978c20d91
-
SHA256
d4a31dc5744b566f097f20ee18f55acedec23a55117c88e3cca8d65d8f4020be
-
SHA512
7766fe75347bca80d4754f1e7eebdafb134de91491e94f951b5a22ae27a62d7015f5c6c326aeb6ab65cd8f176e4f8ba355f11751b4685c5c1d60765526ed6111
-
SSDEEP
24576:ceaMajUi+6C+mDjn7gbkFaSH7Wu4mIWGE1Sy/fBEXTHhaTEEER71RM4I13:ceaj9bHmMbkBHVdGE1Sy/ujhaIh+1
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-