General
-
Target
65fa57c7a8ac3956292be0a17e56f35fff14fb060cd6022889665901a6ecda5c.exe
-
Size
1.4MB
-
Sample
241222-lqt56stjfw
-
MD5
4ad4cc9b5b82fc59756523b5b49da103
-
SHA1
239321573ab48845b649af41908eecadd972dc04
-
SHA256
65fa57c7a8ac3956292be0a17e56f35fff14fb060cd6022889665901a6ecda5c
-
SHA512
96c8164723c4ada3ab78a63a94e8b35ed41bebdbdf1591f452453a0209f264120572e1c11e60962ca8b1e2fd96f686f1627eab94d0fbeb86e1c931d803a0ca4b
-
SSDEEP
24576:U2G/nvxW3Ww0teOtQEIQ/E8pi63hn89pN3bfqaeTBHLChWFBAtlIBGIP5M:UbA30cn8Y6d89f3e5LhFSnIBhG
Behavioral task
behavioral1
Sample
65fa57c7a8ac3956292be0a17e56f35fff14fb060cd6022889665901a6ecda5c.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
65fa57c7a8ac3956292be0a17e56f35fff14fb060cd6022889665901a6ecda5c.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
65fa57c7a8ac3956292be0a17e56f35fff14fb060cd6022889665901a6ecda5c.exe
-
Size
1.4MB
-
MD5
4ad4cc9b5b82fc59756523b5b49da103
-
SHA1
239321573ab48845b649af41908eecadd972dc04
-
SHA256
65fa57c7a8ac3956292be0a17e56f35fff14fb060cd6022889665901a6ecda5c
-
SHA512
96c8164723c4ada3ab78a63a94e8b35ed41bebdbdf1591f452453a0209f264120572e1c11e60962ca8b1e2fd96f686f1627eab94d0fbeb86e1c931d803a0ca4b
-
SSDEEP
24576:U2G/nvxW3Ww0teOtQEIQ/E8pi63hn89pN3bfqaeTBHLChWFBAtlIBGIP5M:UbA30cn8Y6d89f3e5LhFSnIBhG
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-