General
-
Target
rat.exe
-
Size
1.2MB
-
Sample
241223-h4mrgaxlcz
-
MD5
7dc1fac0a91371059c4959018d998246
-
SHA1
1e4b5bfe7eff105aa7bc9993dc5de60cf17f1077
-
SHA256
76026875359a6b6e9276f93918b6e53a955e7f882345316052e5940bd18670bc
-
SHA512
213643d7559a39e83bdeae4355575588beceaaac46970430bae6f87f3a3ffdd3cfc53dd052ffe3b2a5fde72ea4d73e6d4c30104d639a7845a56ae010b24eec2e
-
SSDEEP
24576:P2G/nvxW3Wwa8FWTwXPnIh3qeJaEKl1tqL:PbA3/0Tfh3qG
Behavioral task
behavioral1
Sample
rat.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
rat.exe
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral3
Sample
rat.exe
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
rat.exe
-
Size
1.2MB
-
MD5
7dc1fac0a91371059c4959018d998246
-
SHA1
1e4b5bfe7eff105aa7bc9993dc5de60cf17f1077
-
SHA256
76026875359a6b6e9276f93918b6e53a955e7f882345316052e5940bd18670bc
-
SHA512
213643d7559a39e83bdeae4355575588beceaaac46970430bae6f87f3a3ffdd3cfc53dd052ffe3b2a5fde72ea4d73e6d4c30104d639a7845a56ae010b24eec2e
-
SSDEEP
24576:P2G/nvxW3Wwa8FWTwXPnIh3qeJaEKl1tqL:PbA3/0Tfh3qG
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-