General
-
Target
57edc180e22c8127977a1f9852b06fa8.exe
-
Size
1.3MB
-
Sample
250109-2l3vhsvrdr
-
MD5
57edc180e22c8127977a1f9852b06fa8
-
SHA1
6dbe69ff678326a797c0325e34002bd19f179875
-
SHA256
6c5d017dcc6921a2b008373dca156d6ee454ed875b361c89d2cb724d20929c81
-
SHA512
86d601dda7f95e8c0cd25e9d34b68cbe5a823293f7a413fe4c15865f312c4a63a949da3442b31974a7031e68cd7a7552ec1d35b6ce9995470634de5b691b4927
-
SSDEEP
24576:f2G/nvxW3WcsbisnSOKkipM/zQkRRgoynn+aof:fbA3gbisnSdaQkLunXW
Behavioral task
behavioral1
Sample
57edc180e22c8127977a1f9852b06fa8.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
57edc180e22c8127977a1f9852b06fa8.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
57edc180e22c8127977a1f9852b06fa8.exe
-
Size
1.3MB
-
MD5
57edc180e22c8127977a1f9852b06fa8
-
SHA1
6dbe69ff678326a797c0325e34002bd19f179875
-
SHA256
6c5d017dcc6921a2b008373dca156d6ee454ed875b361c89d2cb724d20929c81
-
SHA512
86d601dda7f95e8c0cd25e9d34b68cbe5a823293f7a413fe4c15865f312c4a63a949da3442b31974a7031e68cd7a7552ec1d35b6ce9995470634de5b691b4927
-
SSDEEP
24576:f2G/nvxW3WcsbisnSOKkipM/zQkRRgoynn+aof:fbA3gbisnSdaQkLunXW
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-