General
-
Target
0.exe
-
Size
3.6MB
-
Sample
250108-kn4fdssng1
-
MD5
2fb7a00fca82d7cc33df9747370ada41
-
SHA1
e15a485b27f8d43ecc624f018df5df4b54fe2781
-
SHA256
5d397b2ae1f225f57933256265051b2629234b0068a9d3a0c16effa1afc120f9
-
SHA512
e2b3d772dbeaa5b6faa17913b5a7dda356c0215d709a3492bb9bdd53c871cf595980083b33903161493b6bdfbbd384c1effefc4df966d245759ac85c04bbbb8a
-
SSDEEP
98304:j+yA1ZY+BmmQuY7QwgSq6AWZ17O8YwDeJv8wVqwIlj03S:j+j7DAcw7zYwD88w4hm
Static task
static1
Behavioral task
behavioral1
Sample
0.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
0.exe
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral3
Sample
0.exe
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
0.exe
-
Size
3.6MB
-
MD5
2fb7a00fca82d7cc33df9747370ada41
-
SHA1
e15a485b27f8d43ecc624f018df5df4b54fe2781
-
SHA256
5d397b2ae1f225f57933256265051b2629234b0068a9d3a0c16effa1afc120f9
-
SHA512
e2b3d772dbeaa5b6faa17913b5a7dda356c0215d709a3492bb9bdd53c871cf595980083b33903161493b6bdfbbd384c1effefc4df966d245759ac85c04bbbb8a
-
SSDEEP
98304:j+yA1ZY+BmmQuY7QwgSq6AWZ17O8YwDeJv8wVqwIlj03S:j+j7DAcw7zYwD88w4hm
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-