General
-
Target
546ca44e32049e1e1de5227c9107a4412e667006b68c46b257f07fa649b0531bN.exe
-
Size
1.7MB
-
Sample
241210-hsqnzsspdp
-
MD5
9e38d3b137fb47178d7a651e0faab690
-
SHA1
5d95d535526305e76bd6371eecba4ca2f44f3a42
-
SHA256
546ca44e32049e1e1de5227c9107a4412e667006b68c46b257f07fa649b0531b
-
SHA512
229d68f06d073d7cae4460a0b5c31140c6e9a5746e26b23418a47c3a1b06974f9b552c53e6e22280b430982d966a87f74d248fee0dfae74f4cf6e0ffdddc8ff9
-
SSDEEP
49152:z+gYXZTD1VXUqzX7VwjvMoh1IFyuyigWnMzm6sDBKv:eTHUxUoh1IF9gl2
Behavioral task
behavioral1
Sample
546ca44e32049e1e1de5227c9107a4412e667006b68c46b257f07fa649b0531bN.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
546ca44e32049e1e1de5227c9107a4412e667006b68c46b257f07fa649b0531bN.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
546ca44e32049e1e1de5227c9107a4412e667006b68c46b257f07fa649b0531bN.exe
-
Size
1.7MB
-
MD5
9e38d3b137fb47178d7a651e0faab690
-
SHA1
5d95d535526305e76bd6371eecba4ca2f44f3a42
-
SHA256
546ca44e32049e1e1de5227c9107a4412e667006b68c46b257f07fa649b0531b
-
SHA512
229d68f06d073d7cae4460a0b5c31140c6e9a5746e26b23418a47c3a1b06974f9b552c53e6e22280b430982d966a87f74d248fee0dfae74f4cf6e0ffdddc8ff9
-
SSDEEP
49152:z+gYXZTD1VXUqzX7VwjvMoh1IFyuyigWnMzm6sDBKv:eTHUxUoh1IF9gl2
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-