General
-
Target
271009f132fc388837832a08962ff48c1e76372e047b31cce3db4ad047746855N.exe
-
Size
829KB
-
Sample
241207-zs5xcatkbv
-
MD5
78a0654a256451e953d47049aaa60200
-
SHA1
85eba2ba3f585a889380841c991937448ba61066
-
SHA256
271009f132fc388837832a08962ff48c1e76372e047b31cce3db4ad047746855
-
SHA512
71cd1ddf7defc16a65db41aa0f93c55690e7c0dbbee04df8bc7efcffa251c9bbbeb6a471e02c621fc1767c19861d787d53bddfdab36d57d081cf875348b636b3
-
SSDEEP
12288:gVMHbu7aqZzgikCU6tLuY4pkZQbGGnTjkOcQrR0IeIsCaB5aAfCqEfSKIsza8t:numqZzVuY4G+bGGnHkUeaC6qEKKH
Behavioral task
behavioral1
Sample
271009f132fc388837832a08962ff48c1e76372e047b31cce3db4ad047746855N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
271009f132fc388837832a08962ff48c1e76372e047b31cce3db4ad047746855N.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
271009f132fc388837832a08962ff48c1e76372e047b31cce3db4ad047746855N.exe
-
Size
829KB
-
MD5
78a0654a256451e953d47049aaa60200
-
SHA1
85eba2ba3f585a889380841c991937448ba61066
-
SHA256
271009f132fc388837832a08962ff48c1e76372e047b31cce3db4ad047746855
-
SHA512
71cd1ddf7defc16a65db41aa0f93c55690e7c0dbbee04df8bc7efcffa251c9bbbeb6a471e02c621fc1767c19861d787d53bddfdab36d57d081cf875348b636b3
-
SSDEEP
12288:gVMHbu7aqZzgikCU6tLuY4pkZQbGGnTjkOcQrR0IeIsCaB5aAfCqEfSKIsza8t:numqZzVuY4G+bGGnHkUeaC6qEKKH
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Drops file in System32 directory
-