General
-
Target
gamingservices.exe
-
Size
1.8MB
-
Sample
241216-me5cfawnfy
-
MD5
7e1cbd229ae163375fc55065690e27b4
-
SHA1
f1cecafde4f843b03f3defffcac7fd6950b582a6
-
SHA256
4a3e0402f692a391300bb5dd374086e2ae642725918fce5a703d686899024559
-
SHA512
545c246f2d0159f5c2f7631b891c19166505c525b0a6d66f2338460dfda94679da283aa3e8dffa7fc6fec5752cedbce753f731a7064cff8754970d8968d3c882
-
SSDEEP
24576:7Sgle/EPZ5XpxBeonQxcYHgC+aviVZZmQ5NnL+MIWRbtHU4aClCbs8HF7Kz9jxG:7AsZWHgReoP7nyWtHPaB37S9jx
Static task
static1
Behavioral task
behavioral1
Sample
gamingservices.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
gamingservices.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
gamingservices.exe
-
Size
1.8MB
-
MD5
7e1cbd229ae163375fc55065690e27b4
-
SHA1
f1cecafde4f843b03f3defffcac7fd6950b582a6
-
SHA256
4a3e0402f692a391300bb5dd374086e2ae642725918fce5a703d686899024559
-
SHA512
545c246f2d0159f5c2f7631b891c19166505c525b0a6d66f2338460dfda94679da283aa3e8dffa7fc6fec5752cedbce753f731a7064cff8754970d8968d3c882
-
SSDEEP
24576:7Sgle/EPZ5XpxBeonQxcYHgC+aviVZZmQ5NnL+MIWRbtHU4aClCbs8HF7Kz9jxG:7AsZWHgReoP7nyWtHPaB37S9jx
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-