General
-
Target
280d02773aff905f8fc06b2bbd3b67172005332b95b0d96c0565686a0f04ecd7.exe
-
Size
1.7MB
-
Sample
250108-a9qfjsynbp
-
MD5
4a8994a80aa3d8e09fe54ca5127b9d6f
-
SHA1
d52bec1d453017c28c412be067821893ec3c8f64
-
SHA256
280d02773aff905f8fc06b2bbd3b67172005332b95b0d96c0565686a0f04ecd7
-
SHA512
f27c4d6a4f01e17e37ee31bb2d98ec83977bcc6e7e49464ad1248aa03b5a1973f8cc7d189bba5c806b0ba47a3f23804ea1a873c7c0b1e7c2e9a41c84f039e339
-
SSDEEP
49152:z+gYXZTD1VXUqzX7VwjvMoh1IFyuyigWnMzm6sDBKva:eTHUxUoh1IF9gl2b
Behavioral task
behavioral1
Sample
280d02773aff905f8fc06b2bbd3b67172005332b95b0d96c0565686a0f04ecd7.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
280d02773aff905f8fc06b2bbd3b67172005332b95b0d96c0565686a0f04ecd7.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
280d02773aff905f8fc06b2bbd3b67172005332b95b0d96c0565686a0f04ecd7.exe
-
Size
1.7MB
-
MD5
4a8994a80aa3d8e09fe54ca5127b9d6f
-
SHA1
d52bec1d453017c28c412be067821893ec3c8f64
-
SHA256
280d02773aff905f8fc06b2bbd3b67172005332b95b0d96c0565686a0f04ecd7
-
SHA512
f27c4d6a4f01e17e37ee31bb2d98ec83977bcc6e7e49464ad1248aa03b5a1973f8cc7d189bba5c806b0ba47a3f23804ea1a873c7c0b1e7c2e9a41c84f039e339
-
SSDEEP
49152:z+gYXZTD1VXUqzX7VwjvMoh1IFyuyigWnMzm6sDBKva:eTHUxUoh1IF9gl2b
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-