General
-
Target
client.exe
-
Size
2.1MB
-
Sample
241204-srrj1ayrfx
-
MD5
bf4f13d82d217ed69d80124c50d9441c
-
SHA1
b7ee7d109f61371342e924e6a0c3505347dd318f
-
SHA256
51890bfc6f223014ff16f4bfa6ace8e2d2ec3c81eb6965406813b9ca32b08508
-
SHA512
1ba17e55d6d1f6fda99daffe3f11f995d5e8434901b2aea9105728ccbff1b81727d96bf8811a62e8367fca0ec23bdea331165b001088b183281164269668d2f4
-
SSDEEP
49152:IBJzOZxI4F2vH8tr79p4MUm96NqpbJEQS8M0fPqnG9c:yBOZxI4Fftr79fkNqS07u
Static task
static1
Behavioral task
behavioral1
Sample
client.exe
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
client.exe
-
Size
2.1MB
-
MD5
bf4f13d82d217ed69d80124c50d9441c
-
SHA1
b7ee7d109f61371342e924e6a0c3505347dd318f
-
SHA256
51890bfc6f223014ff16f4bfa6ace8e2d2ec3c81eb6965406813b9ca32b08508
-
SHA512
1ba17e55d6d1f6fda99daffe3f11f995d5e8434901b2aea9105728ccbff1b81727d96bf8811a62e8367fca0ec23bdea331165b001088b183281164269668d2f4
-
SSDEEP
49152:IBJzOZxI4F2vH8tr79p4MUm96NqpbJEQS8M0fPqnG9c:yBOZxI4Fftr79fkNqS07u
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-