General
-
Target
containerServerperf.exe
-
Size
828KB
-
Sample
241223-jbg6ysxnfl
-
MD5
ddce5f6cd47da319bbd8141d3a0fa618
-
SHA1
4b3bafd730ebc70dcc1441fca2c21b81fab9ea03
-
SHA256
fe48d8776f5c31ba36162463e3a5a89378ef4a177c6d9cf74750ff469b5de3d3
-
SHA512
05e82ea24d54336cd33bb297967c8eb773389ded37401041739152ff5ad212fbc2d2a6660b27277517071b89c02ab8fb3859d9bc03add1f91ea86eb516a18d59
-
SSDEEP
12288:nc79Njwwi1Zn7YnnDh47SqeJazwiXbAxQhcMBmXq3dq:nWTwXPnIh3qeJaEKl1tq
Behavioral task
behavioral1
Sample
containerServerperf.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
containerServerperf.exe
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral3
Sample
containerServerperf.exe
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
containerServerperf.exe
-
Size
828KB
-
MD5
ddce5f6cd47da319bbd8141d3a0fa618
-
SHA1
4b3bafd730ebc70dcc1441fca2c21b81fab9ea03
-
SHA256
fe48d8776f5c31ba36162463e3a5a89378ef4a177c6d9cf74750ff469b5de3d3
-
SHA512
05e82ea24d54336cd33bb297967c8eb773389ded37401041739152ff5ad212fbc2d2a6660b27277517071b89c02ab8fb3859d9bc03add1f91ea86eb516a18d59
-
SSDEEP
12288:nc79Njwwi1Zn7YnnDh47SqeJazwiXbAxQhcMBmXq3dq:nWTwXPnIh3qeJaEKl1tq
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Drops file in System32 directory
-