General
-
Target
916a143563e75f975b628b8201560e7e870a7b0ae9684b1d1637884f7f30eeb9
-
Size
1.7MB
-
Sample
241221-c6r63s1lcq
-
MD5
7a6337d1705c5b4e696b224c29fc5233
-
SHA1
5631625b8754ac8e02f9b441a47b229ac37a6cbc
-
SHA256
916a143563e75f975b628b8201560e7e870a7b0ae9684b1d1637884f7f30eeb9
-
SHA512
7727e5546724c46ac6c481989860e93f7b0e4537a0fc8a1d8595657181c985213f794390f0198a4a69f7b19f999b4bfef5d044f2a6fd2ecc51be119207753efe
-
SSDEEP
24576:N3QwuLyEbVoCtPreIjNLoN/VNGeSQDx1m17zezKOkCzeJGFUJ:NgwuuEpdDLNwVMeXDL0fdSzAG
Behavioral task
behavioral1
Sample
916a143563e75f975b628b8201560e7e870a7b0ae9684b1d1637884f7f30eeb9.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
916a143563e75f975b628b8201560e7e870a7b0ae9684b1d1637884f7f30eeb9.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
916a143563e75f975b628b8201560e7e870a7b0ae9684b1d1637884f7f30eeb9
-
Size
1.7MB
-
MD5
7a6337d1705c5b4e696b224c29fc5233
-
SHA1
5631625b8754ac8e02f9b441a47b229ac37a6cbc
-
SHA256
916a143563e75f975b628b8201560e7e870a7b0ae9684b1d1637884f7f30eeb9
-
SHA512
7727e5546724c46ac6c481989860e93f7b0e4537a0fc8a1d8595657181c985213f794390f0198a4a69f7b19f999b4bfef5d044f2a6fd2ecc51be119207753efe
-
SSDEEP
24576:N3QwuLyEbVoCtPreIjNLoN/VNGeSQDx1m17zezKOkCzeJGFUJ:NgwuuEpdDLNwVMeXDL0fdSzAG
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-