General
-
Target
ff3f337ba133257bf7ef80c83af6a374.bin
-
Size
1.3MB
-
Sample
241210-cd9weszjgz
-
MD5
72ad15125dbbb5f2124ba00bf1d98507
-
SHA1
ab72ca4bdf9d0047ba986dd488b6ee2420b83c76
-
SHA256
5b2d9af4718697f083ff36fdf7e0cd69dee9467bd842a62153d7de28b586c6bd
-
SHA512
6c4d2c9acfc201c8e104238f2f26b5dfa798b2817dd3c668b10a9717134293b686198d7baff0238f98fd10381138fa3cfb3c7bd0c79e87f19c94516cc46c9a52
-
SSDEEP
24576:1Hojjr9jqDqhe+M5LsoG1XTpUjiok2jIF7zQuNSRitzN7HfW74c:1Hcf9jqL+M5If1X1UjtkHF77Ssc0c
Static task
static1
Behavioral task
behavioral1
Sample
de22374f782e1898ae2c015f41159b7485122a65ef26b0850e3c0609d41f2cde.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
de22374f782e1898ae2c015f41159b7485122a65ef26b0850e3c0609d41f2cde.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
de22374f782e1898ae2c015f41159b7485122a65ef26b0850e3c0609d41f2cde.exe
-
Size
1.7MB
-
MD5
ff3f337ba133257bf7ef80c83af6a374
-
SHA1
6c1746e5455bba5c362db11bf5aef0adaaea6337
-
SHA256
de22374f782e1898ae2c015f41159b7485122a65ef26b0850e3c0609d41f2cde
-
SHA512
f245180c0edbcd0836abc01e6660a95d698056109151e1451b8ce17c128aea1456c5cb3b23439645ef9dcc155a11801ee0d3ac6e334b66db191da98bb404a053
-
SSDEEP
24576:LKoAZDIza+c3NunPWpnVuO2PJftX9fRQY16zIWJC5JUqR8lLr0I4gyid81sRO/F:LKdluO2P3N5QkWtlLr0ICNyO
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-