General
-
Target
dea6d6cb7f46f0236f831b99612a7ff6890871b5309292dbcf6801d6c06da969N.exe
-
Size
1.7MB
-
Sample
241208-dz7tmazpc1
-
MD5
5c23172320d7107e9c3dfd6d6f0abbd0
-
SHA1
97b7676138ca777520ca12a35eb63d71ca7953e6
-
SHA256
dea6d6cb7f46f0236f831b99612a7ff6890871b5309292dbcf6801d6c06da969
-
SHA512
a049b7045ddd94269fa367b4ebe533097376f4ec4ceccaa00c5a9d641bd145bee72ad3e1ed52e99425a8de1ac0f36314a38957cf397e20205607af88153ada80
-
SSDEEP
49152:T+gYXZTD1VXUqzX7VwjvMoh1IFyuyigWnMzm6sDBKv:+THUxUoh1IF9gl2
Behavioral task
behavioral1
Sample
dea6d6cb7f46f0236f831b99612a7ff6890871b5309292dbcf6801d6c06da969N.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
dea6d6cb7f46f0236f831b99612a7ff6890871b5309292dbcf6801d6c06da969N.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
dea6d6cb7f46f0236f831b99612a7ff6890871b5309292dbcf6801d6c06da969N.exe
-
Size
1.7MB
-
MD5
5c23172320d7107e9c3dfd6d6f0abbd0
-
SHA1
97b7676138ca777520ca12a35eb63d71ca7953e6
-
SHA256
dea6d6cb7f46f0236f831b99612a7ff6890871b5309292dbcf6801d6c06da969
-
SHA512
a049b7045ddd94269fa367b4ebe533097376f4ec4ceccaa00c5a9d641bd145bee72ad3e1ed52e99425a8de1ac0f36314a38957cf397e20205607af88153ada80
-
SSDEEP
49152:T+gYXZTD1VXUqzX7VwjvMoh1IFyuyigWnMzm6sDBKv:+THUxUoh1IF9gl2
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-