General
-
Target
da044c033d375095443875b680b1de847b251d30e55e68fb8e3735c25286bb59
-
Size
829KB
-
Sample
241203-degfyasmdn
-
MD5
cbadabd5f33ef27c7859a83fc1a2c973
-
SHA1
a155b4f7e2df225012b3f416ac13c2aab696f240
-
SHA256
da044c033d375095443875b680b1de847b251d30e55e68fb8e3735c25286bb59
-
SHA512
bf87a61b9a65f9c42d3bcf057ba08b328dffad7b50a49a34806a66585411849f4335336932fbfa88ec422995b394bbc4f4c326f6b9b0a4c0e28d8054057a8972
-
SSDEEP
24576:/8snXXpIYvwMS2AKO99fP7NvujxVMzMx:/8s1vmvM
Behavioral task
behavioral1
Sample
da044c033d375095443875b680b1de847b251d30e55e68fb8e3735c25286bb59.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
da044c033d375095443875b680b1de847b251d30e55e68fb8e3735c25286bb59.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
da044c033d375095443875b680b1de847b251d30e55e68fb8e3735c25286bb59
-
Size
829KB
-
MD5
cbadabd5f33ef27c7859a83fc1a2c973
-
SHA1
a155b4f7e2df225012b3f416ac13c2aab696f240
-
SHA256
da044c033d375095443875b680b1de847b251d30e55e68fb8e3735c25286bb59
-
SHA512
bf87a61b9a65f9c42d3bcf057ba08b328dffad7b50a49a34806a66585411849f4335336932fbfa88ec422995b394bbc4f4c326f6b9b0a4c0e28d8054057a8972
-
SSDEEP
24576:/8snXXpIYvwMS2AKO99fP7NvujxVMzMx:/8s1vmvM
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-