General
-
Target
c61e798b760688db6bc3f7ef8dc59019.exe
-
Size
2.3MB
-
Sample
250106-gde39sznfk
-
MD5
c61e798b760688db6bc3f7ef8dc59019
-
SHA1
bbf23a7b79c81335c48cd6d27c8be15c08e51202
-
SHA256
48da1fa982cffab890ae643f4301ffa65949883ae6e6bbb746857a07b9485ef5
-
SHA512
8f4474b7ba40f7797203392553b73467296f9e27e569dd15b990322ad94b4bd3bca61b979817952fe0a82867f82232bd61688ba4ed47b6c133a95701e6fc3667
-
SSDEEP
49152:t/twBGYfNs6Vlo2sRsWFjnh5WeX2/tEaZ1XwiB:tlwBGYFZVOZFjXrm/tLZ1Ai
Behavioral task
behavioral1
Sample
c61e798b760688db6bc3f7ef8dc59019.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c61e798b760688db6bc3f7ef8dc59019.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
c61e798b760688db6bc3f7ef8dc59019.exe
-
Size
2.3MB
-
MD5
c61e798b760688db6bc3f7ef8dc59019
-
SHA1
bbf23a7b79c81335c48cd6d27c8be15c08e51202
-
SHA256
48da1fa982cffab890ae643f4301ffa65949883ae6e6bbb746857a07b9485ef5
-
SHA512
8f4474b7ba40f7797203392553b73467296f9e27e569dd15b990322ad94b4bd3bca61b979817952fe0a82867f82232bd61688ba4ed47b6c133a95701e6fc3667
-
SSDEEP
49152:t/twBGYfNs6Vlo2sRsWFjnh5WeX2/tEaZ1XwiB:tlwBGYFZVOZFjXrm/tLZ1Ai
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-