General
-
Target
d39e417bda2e1e9b7f79fa8e974fdc6e06e82d3969eb8.exe
-
Size
2.3MB
-
Sample
250107-tmxqwsznep
-
MD5
465c263dd263abe9b54f1514ae40f005
-
SHA1
55b176f6b878e38f809c63b15408c5f76438398a
-
SHA256
d39e417bda2e1e9b7f79fa8e974fdc6e06e82d3969eb8125d1274046b69b7dae
-
SHA512
c15e107b267aad8e17acb275ac6eda8b829ed5aa9b3c451cb8810b7e993b674acf2821337482424adec25d366e37c6708dd14bfa7876ffca1faa28a1fdbbd2f2
-
SSDEEP
49152:cXyFqpEX5DJ+8WLlEPeZUaPSzes33Ll4EPx79QCKZLwV6:ACqpmX+plEPys37bRQ
Behavioral task
behavioral1
Sample
d39e417bda2e1e9b7f79fa8e974fdc6e06e82d3969eb8.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d39e417bda2e1e9b7f79fa8e974fdc6e06e82d3969eb8.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
d39e417bda2e1e9b7f79fa8e974fdc6e06e82d3969eb8.exe
-
Size
2.3MB
-
MD5
465c263dd263abe9b54f1514ae40f005
-
SHA1
55b176f6b878e38f809c63b15408c5f76438398a
-
SHA256
d39e417bda2e1e9b7f79fa8e974fdc6e06e82d3969eb8125d1274046b69b7dae
-
SHA512
c15e107b267aad8e17acb275ac6eda8b829ed5aa9b3c451cb8810b7e993b674acf2821337482424adec25d366e37c6708dd14bfa7876ffca1faa28a1fdbbd2f2
-
SSDEEP
49152:cXyFqpEX5DJ+8WLlEPeZUaPSzes33Ll4EPx79QCKZLwV6:ACqpmX+plEPys37bRQ
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-