General
-
Target
7dbbe0919357ceef595d52dc6723aad8c43ebb107952aa8f62dbf05e7682b750
-
Size
1.7MB
-
Sample
241204-3v4c3stkfl
-
MD5
688dfbd7ae580d677742065afa2f2991
-
SHA1
9742697e260249d2380b8199856b030057670cd1
-
SHA256
7dbbe0919357ceef595d52dc6723aad8c43ebb107952aa8f62dbf05e7682b750
-
SHA512
afc474710e071db0caf4d3fd89beddb2a5d6bbfa9e6b93fcd059a33191e66db9bb0b4f4fe0ac4baf5451936c0269a5b8b05355f2076f300bdf852b8a3fb32144
-
SSDEEP
49152:z+gYXZTD1VXUqzX7VwjvMoh1IFyuyigWnMzm6sDBKv:eTHUxUoh1IF9gl2
Behavioral task
behavioral1
Sample
7dbbe0919357ceef595d52dc6723aad8c43ebb107952aa8f62dbf05e7682b750.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7dbbe0919357ceef595d52dc6723aad8c43ebb107952aa8f62dbf05e7682b750.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
7dbbe0919357ceef595d52dc6723aad8c43ebb107952aa8f62dbf05e7682b750
-
Size
1.7MB
-
MD5
688dfbd7ae580d677742065afa2f2991
-
SHA1
9742697e260249d2380b8199856b030057670cd1
-
SHA256
7dbbe0919357ceef595d52dc6723aad8c43ebb107952aa8f62dbf05e7682b750
-
SHA512
afc474710e071db0caf4d3fd89beddb2a5d6bbfa9e6b93fcd059a33191e66db9bb0b4f4fe0ac4baf5451936c0269a5b8b05355f2076f300bdf852b8a3fb32144
-
SSDEEP
49152:z+gYXZTD1VXUqzX7VwjvMoh1IFyuyigWnMzm6sDBKv:eTHUxUoh1IF9gl2
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Drops file in System32 directory
-