General
-
Target
150550df367f8d6334843deee8de66a3.bin
-
Size
595KB
-
Sample
241208-bdhaqsyqek
-
MD5
fa2616709f24a63e54b943307af012a6
-
SHA1
7ef9399e3de00581342b5f96325cd57c8733fd5b
-
SHA256
0ea1a8292aca1e59f3e6ac577ed72e2be6a6ed29ac8f45a702e13add14348776
-
SHA512
8828adaf7c80d829de0b82f91020f0f4336147fd563dda3f77dd0a59df912e872e5a6a7536e82be35d41c2f2a8635c60d39dc5831fa4f3c962b2049aceb4fe72
-
SSDEEP
12288:np/j3A0GBt8TfnEsmEjCyZAUdKH1/XYOuWKy3qsdU6ylJP3JgmGKi:n1rAZ8DE+j1Z7dW1w5DMqj6Q3emGKi
Behavioral task
behavioral1
Sample
36fce76e89c0c4e4798956b61abad0e5e28e0732763699ce3c5003518b643496.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
36fce76e89c0c4e4798956b61abad0e5e28e0732763699ce3c5003518b643496.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
36fce76e89c0c4e4798956b61abad0e5e28e0732763699ce3c5003518b643496.exe
-
Size
1.1MB
-
MD5
150550df367f8d6334843deee8de66a3
-
SHA1
8edcd7ff34e8c4a6cbc74fe57c831e5c400783f4
-
SHA256
36fce76e89c0c4e4798956b61abad0e5e28e0732763699ce3c5003518b643496
-
SHA512
427afc1255c109d47c1b879ba84c98225becd644cea03a4b926679381a73aeb6760bd974af558f667fd2588077ba701e8193a20c788bfd5a601dfa5f4712438c
-
SSDEEP
24576:U2G/nvxW3Ww0tWumqZzVuY4G+bGGnHkUeaC6qEKKH8:UbA30iyuY4GEHkZ2KF
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-