General
-
Target
DCRatBuild.exe
-
Size
1.3MB
-
Sample
250107-tmalcszndl
-
MD5
3cae6ba9349f77e982f0495a97dbe596
-
SHA1
da7fd2dbb9fc13b40294e3f287e000e167d7fcf7
-
SHA256
be6dac55f4e3588de5770d348b4b601440542d6a2ae1bc1fa97630849203ab01
-
SHA512
e2425f01ba7f2566b4f91d623c2011de6cc13f9f9a78cdee3a1efc8f94fa5dd5ea32bdf7b30631dd27b512e2b9ca00b8569fe7610dd749f220375e8d10c8c758
-
SSDEEP
24576:U2G/nvxW3Ww0tuBx4NP3a1tPTBI8mtei+Ya+B8TWKV:UbA30M4NO/K+Ya+Md
Behavioral task
behavioral1
Sample
DCRatBuild.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
DCRatBuild.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
DCRatBuild.exe
-
Size
1.3MB
-
MD5
3cae6ba9349f77e982f0495a97dbe596
-
SHA1
da7fd2dbb9fc13b40294e3f287e000e167d7fcf7
-
SHA256
be6dac55f4e3588de5770d348b4b601440542d6a2ae1bc1fa97630849203ab01
-
SHA512
e2425f01ba7f2566b4f91d623c2011de6cc13f9f9a78cdee3a1efc8f94fa5dd5ea32bdf7b30631dd27b512e2b9ca00b8569fe7610dd749f220375e8d10c8c758
-
SSDEEP
24576:U2G/nvxW3Ww0tuBx4NP3a1tPTBI8mtei+Ya+B8TWKV:UbA30M4NO/K+Ya+Md
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-