Resubmissions
21-12-2024 04:50
241221-fgasaatlcl 10General
-
Target
c1d8febd8745bf2f6a446abc920b1c67f76b8f2980e65f4dca8512c70a0d6045
-
Size
1.7MB
-
Sample
241221-fgasaatlcl
-
MD5
9b3e774fdf342e63dc855ce00ba70555
-
SHA1
2243b3e4cf15d76c33d7b791367002ddb929386d
-
SHA256
c1d8febd8745bf2f6a446abc920b1c67f76b8f2980e65f4dca8512c70a0d6045
-
SHA512
d50374c8bae3c8c9d7e5abd3ca8494f0e458c9b99c444061291ea6efbc70e607d6036a647e25426da042243350cd36c49e68a2660b4b961310e26b40c00846f2
-
SSDEEP
24576:t3QwuLyEbVoCtPreIjNLoN/VNGeSQDx1m17zezKOkCzeJGFUJ:tgwuuEpdDLNwVMeXDL0fdSzAG
Behavioral task
behavioral1
Sample
c1d8febd8745bf2f6a446abc920b1c67f76b8f2980e65f4dca8512c70a0d6045.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c1d8febd8745bf2f6a446abc920b1c67f76b8f2980e65f4dca8512c70a0d6045.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
c1d8febd8745bf2f6a446abc920b1c67f76b8f2980e65f4dca8512c70a0d6045
-
Size
1.7MB
-
MD5
9b3e774fdf342e63dc855ce00ba70555
-
SHA1
2243b3e4cf15d76c33d7b791367002ddb929386d
-
SHA256
c1d8febd8745bf2f6a446abc920b1c67f76b8f2980e65f4dca8512c70a0d6045
-
SHA512
d50374c8bae3c8c9d7e5abd3ca8494f0e458c9b99c444061291ea6efbc70e607d6036a647e25426da042243350cd36c49e68a2660b4b961310e26b40c00846f2
-
SSDEEP
24576:t3QwuLyEbVoCtPreIjNLoN/VNGeSQDx1m17zezKOkCzeJGFUJ:tgwuuEpdDLNwVMeXDL0fdSzAG
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Drops file in System32 directory
-