General
-
Target
717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe
-
Size
1.7MB
-
Sample
241124-j1ky5sxman
-
MD5
9ecc3c152d84531b1ceba5d779e60750
-
SHA1
2db878eb2f9bfb50cfa51a12544a3cd4ae337d31
-
SHA256
717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530
-
SHA512
02864e5aaa7a7cf4a321e19eae5fe5e752299775387c52560c1c5c036e3fa7daf79d019f34b77206980a669d11f515a4c6f52c28fbbcdb6ffd616c3c4418fb1b
-
SSDEEP
24576:N3QwuLyEbVoCtPreIjNLoN/VNGeSQDx1m17zezKOkCzeJGFUJ:NgwuuEpdDLNwVMeXDL0fdSzAG
Behavioral task
behavioral1
Sample
717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe
-
Size
1.7MB
-
MD5
9ecc3c152d84531b1ceba5d779e60750
-
SHA1
2db878eb2f9bfb50cfa51a12544a3cd4ae337d31
-
SHA256
717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530
-
SHA512
02864e5aaa7a7cf4a321e19eae5fe5e752299775387c52560c1c5c036e3fa7daf79d019f34b77206980a669d11f515a4c6f52c28fbbcdb6ffd616c3c4418fb1b
-
SSDEEP
24576:N3QwuLyEbVoCtPreIjNLoN/VNGeSQDx1m17zezKOkCzeJGFUJ:NgwuuEpdDLNwVMeXDL0fdSzAG
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-