General
-
Target
javaw.exe
-
Size
858KB
-
Sample
241111-py3dassphk
-
MD5
ea2dd294adcba588fb4e947640fc6274
-
SHA1
5c6aaee79b68a9aadd5635600c35b26032347191
-
SHA256
6cb03004ec84fff242274e857dde5879044fc6e482c29ce9a06bc8e83cb5ddba
-
SHA512
e91cca7e41aa6f3415206e7ae445f7c25bc408f91f5037ca7333c66bc13ee094d582772d4fcfd502c423ff22928fb07085954e51175b99bdc2da3fef38785a4f
-
SSDEEP
12288:Bez6kUa93Bd4pgZ82pK60gXz5EOPIMI/jS5wzqMVv:BapV938pgq21+voFM
Behavioral task
behavioral1
Sample
javaw.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
javaw.exe
Resource
win10ltsc2021-20241023-en
Malware Config
Targets
-
-
Target
javaw.exe
-
Size
858KB
-
MD5
ea2dd294adcba588fb4e947640fc6274
-
SHA1
5c6aaee79b68a9aadd5635600c35b26032347191
-
SHA256
6cb03004ec84fff242274e857dde5879044fc6e482c29ce9a06bc8e83cb5ddba
-
SHA512
e91cca7e41aa6f3415206e7ae445f7c25bc408f91f5037ca7333c66bc13ee094d582772d4fcfd502c423ff22928fb07085954e51175b99bdc2da3fef38785a4f
-
SSDEEP
12288:Bez6kUa93Bd4pgZ82pK60gXz5EOPIMI/jS5wzqMVv:BapV938pgq21+voFM
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-