General
-
Target
4087dd67130db8a0192954514a065d9e94755a0783a8c32c31b2adfbe3ca528c.exe
-
Size
1.3MB
-
Sample
250108-jqdgba1jgt
-
MD5
2bad7faaa75d08ffaa3034186ac53736
-
SHA1
2105258d18a3c672353aae82ba6a683ececd3436
-
SHA256
4087dd67130db8a0192954514a065d9e94755a0783a8c32c31b2adfbe3ca528c
-
SHA512
3b84a5cab7c5b4beb215b41f309f1abf5c8301791873a3d32f64e899c25eaf9daaccaa0bb776f99ac085d23a7cbfb4df55af0a82cc9fd0a3b0d428b8eaeef7e7
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjCh:UbA30GnzV/q+DnsXgH
Behavioral task
behavioral1
Sample
4087dd67130db8a0192954514a065d9e94755a0783a8c32c31b2adfbe3ca528c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4087dd67130db8a0192954514a065d9e94755a0783a8c32c31b2adfbe3ca528c.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
4087dd67130db8a0192954514a065d9e94755a0783a8c32c31b2adfbe3ca528c.exe
-
Size
1.3MB
-
MD5
2bad7faaa75d08ffaa3034186ac53736
-
SHA1
2105258d18a3c672353aae82ba6a683ececd3436
-
SHA256
4087dd67130db8a0192954514a065d9e94755a0783a8c32c31b2adfbe3ca528c
-
SHA512
3b84a5cab7c5b4beb215b41f309f1abf5c8301791873a3d32f64e899c25eaf9daaccaa0bb776f99ac085d23a7cbfb4df55af0a82cc9fd0a3b0d428b8eaeef7e7
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjCh:UbA30GnzV/q+DnsXgH
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-