General
-
Target
1dd55197686faec9166ce6ff1e7cd9a7950b95fdca49c20db273c0b6131c6cf4
-
Size
1.3MB
-
Sample
241221-vl8x7stphj
-
MD5
1eff34c713968be70953873e8674dbd6
-
SHA1
8614954103af994d677e2ce040c65a9c57210b76
-
SHA256
1dd55197686faec9166ce6ff1e7cd9a7950b95fdca49c20db273c0b6131c6cf4
-
SHA512
20c5a35850d9305252c80bb04be702fcf7dddc99cb72596458475d3ac4337b303924082aa6d57f3017ce97fbb0ab04000426d2065ed9550c49ddc04205b3fbc9
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
1dd55197686faec9166ce6ff1e7cd9a7950b95fdca49c20db273c0b6131c6cf4.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
1dd55197686faec9166ce6ff1e7cd9a7950b95fdca49c20db273c0b6131c6cf4.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
1dd55197686faec9166ce6ff1e7cd9a7950b95fdca49c20db273c0b6131c6cf4
-
Size
1.3MB
-
MD5
1eff34c713968be70953873e8674dbd6
-
SHA1
8614954103af994d677e2ce040c65a9c57210b76
-
SHA256
1dd55197686faec9166ce6ff1e7cd9a7950b95fdca49c20db273c0b6131c6cf4
-
SHA512
20c5a35850d9305252c80bb04be702fcf7dddc99cb72596458475d3ac4337b303924082aa6d57f3017ce97fbb0ab04000426d2065ed9550c49ddc04205b3fbc9
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-