General
-
Target
edd84255835c79c57e078dda2a58c4bef0266a9ad2133030301f8501252d6bc3
-
Size
1.3MB
-
Sample
241221-vajh6stmcq
-
MD5
b10a2cc89ffe888291025739e3c48fa4
-
SHA1
c4529d26b58f4da2f952b7d1aef405f238c879db
-
SHA256
edd84255835c79c57e078dda2a58c4bef0266a9ad2133030301f8501252d6bc3
-
SHA512
a427430906a612187c545263fe8e8dfa334ba9738b6d3d901c06a27eedea0dba32eea6427e6a59d8d21b2a45c2a86b227610183a4d9ade353590c271de2b32b5
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
edd84255835c79c57e078dda2a58c4bef0266a9ad2133030301f8501252d6bc3.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
edd84255835c79c57e078dda2a58c4bef0266a9ad2133030301f8501252d6bc3.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
edd84255835c79c57e078dda2a58c4bef0266a9ad2133030301f8501252d6bc3
-
Size
1.3MB
-
MD5
b10a2cc89ffe888291025739e3c48fa4
-
SHA1
c4529d26b58f4da2f952b7d1aef405f238c879db
-
SHA256
edd84255835c79c57e078dda2a58c4bef0266a9ad2133030301f8501252d6bc3
-
SHA512
a427430906a612187c545263fe8e8dfa334ba9738b6d3d901c06a27eedea0dba32eea6427e6a59d8d21b2a45c2a86b227610183a4d9ade353590c271de2b32b5
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-