General
-
Target
a1d4782417480660db2ba6a327755b76.bin
-
Size
595KB
-
Sample
241201-bx6gnswrgk
-
MD5
5ed1c0ffad8d5ac0b693e9c4dfe1199a
-
SHA1
35d2fc0e58a169aae92ce0eb71c82f6df436df7d
-
SHA256
00f28547cae0aeaa60d23e5440f849687d7c7a21e9410b86717d3a9f19f8b0f9
-
SHA512
d4841227780e080a15710b3c80b74f18d614bb63c52cff56704dfb2919b31479adc3ada1278218d04bfa87861c7b815c3cfe47df32d8278e831bb2f30295ec4e
-
SSDEEP
12288:VW9i/bfDKRppMvqZ6TpEhRFyhGhxyC2gVF/csOtU:VW9srD8pMSZRFyUhxyCBFcBa
Behavioral task
behavioral1
Sample
b92b26104f6813dbaccc15c7595e2cfb3f25a4206aa1b7957bbeac03d5958ef8.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b92b26104f6813dbaccc15c7595e2cfb3f25a4206aa1b7957bbeac03d5958ef8.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
b92b26104f6813dbaccc15c7595e2cfb3f25a4206aa1b7957bbeac03d5958ef8.exe
-
Size
1.1MB
-
MD5
a1d4782417480660db2ba6a327755b76
-
SHA1
ec3e6ab4b58ba02e47a187dbfa404a187140b3a3
-
SHA256
b92b26104f6813dbaccc15c7595e2cfb3f25a4206aa1b7957bbeac03d5958ef8
-
SHA512
50812782ea2fb0a5de109f6e9e5b64a8c6b2ff1102f573f63e75f42274075ab4c8999cf0a62d8ea7f73ee190fbedc2881380d77c4b56de2cd1f029939822461d
-
SSDEEP
24576:U2G/nvxW3Ww0tqoBuQ+I5p5qpLhu33BWwXqto:UbA30TYQ+8qpNWRDq2
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Disables Task Manager via registry modification
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-