General
-
Target
45a89d2fb241df6bae2a79dc922fd124fe9b064512b9dd0806a7f0f633b1689d.exe
-
Size
1.7MB
-
Sample
241210-13l3nawqer
-
MD5
d6ece0dfc8c9c95e0cc2851ee372405d
-
SHA1
2fd8432db75562aa867903b69f1e2c36bbac5fab
-
SHA256
45a89d2fb241df6bae2a79dc922fd124fe9b064512b9dd0806a7f0f633b1689d
-
SHA512
b9e47c3073a8d2dac54f6937491bc55a4c25c23066bbd08d8f5e5203258684ea17d6a3b65c45174c5a8426422c30422dd8773ee560f3fd874cd1a363f2336b27
-
SSDEEP
49152:T+gYXZTD1VXUqzX7VwjvMoh1IFyuyigWnMzm6sDBKva:+THUxUoh1IF9gl2Z
Behavioral task
behavioral1
Sample
45a89d2fb241df6bae2a79dc922fd124fe9b064512b9dd0806a7f0f633b1689d.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
45a89d2fb241df6bae2a79dc922fd124fe9b064512b9dd0806a7f0f633b1689d.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
45a89d2fb241df6bae2a79dc922fd124fe9b064512b9dd0806a7f0f633b1689d.exe
-
Size
1.7MB
-
MD5
d6ece0dfc8c9c95e0cc2851ee372405d
-
SHA1
2fd8432db75562aa867903b69f1e2c36bbac5fab
-
SHA256
45a89d2fb241df6bae2a79dc922fd124fe9b064512b9dd0806a7f0f633b1689d
-
SHA512
b9e47c3073a8d2dac54f6937491bc55a4c25c23066bbd08d8f5e5203258684ea17d6a3b65c45174c5a8426422c30422dd8773ee560f3fd874cd1a363f2336b27
-
SSDEEP
49152:T+gYXZTD1VXUqzX7VwjvMoh1IFyuyigWnMzm6sDBKva:+THUxUoh1IF9gl2Z
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Drops file in System32 directory
-