General
-
Target
fc509ede93c53963e746ce703748657aad8ec57542d722ff7f0d26c1eed2e440
-
Size
1.5MB
-
Sample
241114-e8nyjsvdmp
-
MD5
3f46b4fc008b1267c97e905c89ca60bf
-
SHA1
05725fe5083fc1f15d61a052dc5d3bbab3e34742
-
SHA256
fc509ede93c53963e746ce703748657aad8ec57542d722ff7f0d26c1eed2e440
-
SHA512
d14ec2b39a4a3c906a3f3575a7e3667df33bcbc113eba0da98a906d94bab9f4ada71b79abfe01db28316035b1d87087518bcfd5bc45c094994b56a8efa603b9a
-
SSDEEP
24576:MeaMajUi+6C+mDjn7gbkFaSH7Wu4mIWGE1Sy/fBEXTHhaTEEER71RM4I13:Meaj9bHmMbkBHVdGE1Sy/ujhaIh+1
Behavioral task
behavioral1
Sample
fc509ede93c53963e746ce703748657aad8ec57542d722ff7f0d26c1eed2e440.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
fc509ede93c53963e746ce703748657aad8ec57542d722ff7f0d26c1eed2e440.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
fc509ede93c53963e746ce703748657aad8ec57542d722ff7f0d26c1eed2e440
-
Size
1.5MB
-
MD5
3f46b4fc008b1267c97e905c89ca60bf
-
SHA1
05725fe5083fc1f15d61a052dc5d3bbab3e34742
-
SHA256
fc509ede93c53963e746ce703748657aad8ec57542d722ff7f0d26c1eed2e440
-
SHA512
d14ec2b39a4a3c906a3f3575a7e3667df33bcbc113eba0da98a906d94bab9f4ada71b79abfe01db28316035b1d87087518bcfd5bc45c094994b56a8efa603b9a
-
SSDEEP
24576:MeaMajUi+6C+mDjn7gbkFaSH7Wu4mIWGE1Sy/fBEXTHhaTEEER71RM4I13:Meaj9bHmMbkBHVdGE1Sy/ujhaIh+1
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-