General
-
Target
iagj6m.exe
-
Size
2.1MB
-
Sample
241204-ydkr7axpcy
-
MD5
468eaabf32f5b160b19b6ccbd88fadae
-
SHA1
d8a2f93188429d790bd43f6dee836c96c287a57e
-
SHA256
67a88132279e0e1d1febaa02fca35e77766d0adf1fefacda3c922174428a2f70
-
SHA512
a7db93826a7193e7f4c890c180cb7a1cf71d12884b992cf29aa90faf3351c97f54797f5ecb52a91639219d707f8619c1d0ab04e663499ee6c4b281b2dd3780b6
-
SSDEEP
49152:IBJoehuClT3DpSX+KfJunl9CJ0ouJfK2CKaKWdIuqKs:yyehTLFFKonPJapIF
Static task
static1
Behavioral task
behavioral1
Sample
iagj6m.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
iagj6m.exe
-
Size
2.1MB
-
MD5
468eaabf32f5b160b19b6ccbd88fadae
-
SHA1
d8a2f93188429d790bd43f6dee836c96c287a57e
-
SHA256
67a88132279e0e1d1febaa02fca35e77766d0adf1fefacda3c922174428a2f70
-
SHA512
a7db93826a7193e7f4c890c180cb7a1cf71d12884b992cf29aa90faf3351c97f54797f5ecb52a91639219d707f8619c1d0ab04e663499ee6c4b281b2dd3780b6
-
SSDEEP
49152:IBJoehuClT3DpSX+KfJunl9CJ0ouJfK2CKaKWdIuqKs:yyehTLFFKonPJapIF
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-