General
-
Target
6f3b935175a44298f056598daefd8f4a.exe
-
Size
2.6MB
-
Sample
241219-erx5wsykgn
-
MD5
6f3b935175a44298f056598daefd8f4a
-
SHA1
df49fbdec3d0c697da73ca8d2925522114325e1f
-
SHA256
94af3f003d23484a189ce50929f7e11b7cb4d30d149eb23f6650fafd548dd3fd
-
SHA512
ed1346f979b017ec6b04dc6bdb7645c06975c78a8ddcc2fb97b9447aae65eb102403b20279957336112d4c93e7163803086a9ce6d38370d24f9328c704059a2e
-
SSDEEP
49152:PbA3phxcymVOgnOPsopuCiTsAqKl4iLPuqaLiUDVgZ1jAMLhN:PbYcfVOZEqiTKKl42aLpgZ1jjj
Behavioral task
behavioral1
Sample
6f3b935175a44298f056598daefd8f4a.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6f3b935175a44298f056598daefd8f4a.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
6f3b935175a44298f056598daefd8f4a.exe
-
Size
2.6MB
-
MD5
6f3b935175a44298f056598daefd8f4a
-
SHA1
df49fbdec3d0c697da73ca8d2925522114325e1f
-
SHA256
94af3f003d23484a189ce50929f7e11b7cb4d30d149eb23f6650fafd548dd3fd
-
SHA512
ed1346f979b017ec6b04dc6bdb7645c06975c78a8ddcc2fb97b9447aae65eb102403b20279957336112d4c93e7163803086a9ce6d38370d24f9328c704059a2e
-
SSDEEP
49152:PbA3phxcymVOgnOPsopuCiTsAqKl4iLPuqaLiUDVgZ1jAMLhN:PbYcfVOZEqiTKKl42aLpgZ1jjj
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-