General
-
Target
5b191231ee68e81881d8e1cce969ab6cdf5fe2c6d44b420bfd939bccd35739d9N.exe
-
Size
1.3MB
-
Sample
250107-pa55aasmaj
-
MD5
0696b2076485f2e955ec0c5c31877340
-
SHA1
4d9e6a3a94903be0ac72e0bf969cf5d5a42bc7e5
-
SHA256
5b191231ee68e81881d8e1cce969ab6cdf5fe2c6d44b420bfd939bccd35739d9
-
SHA512
348d8de30402d5ff2105da4b2676d058f4061e071bbb94035a08a69407a6cac774b1692c477e1afb89de3e60acc263950eadb379f63fa374f9e5918a7a2a14ef
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
5b191231ee68e81881d8e1cce969ab6cdf5fe2c6d44b420bfd939bccd35739d9N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5b191231ee68e81881d8e1cce969ab6cdf5fe2c6d44b420bfd939bccd35739d9N.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
5b191231ee68e81881d8e1cce969ab6cdf5fe2c6d44b420bfd939bccd35739d9N.exe
-
Size
1.3MB
-
MD5
0696b2076485f2e955ec0c5c31877340
-
SHA1
4d9e6a3a94903be0ac72e0bf969cf5d5a42bc7e5
-
SHA256
5b191231ee68e81881d8e1cce969ab6cdf5fe2c6d44b420bfd939bccd35739d9
-
SHA512
348d8de30402d5ff2105da4b2676d058f4061e071bbb94035a08a69407a6cac774b1692c477e1afb89de3e60acc263950eadb379f63fa374f9e5918a7a2a14ef
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-