General
-
Target
bc3f7e752971227983d7c0eec18816ae2dbdd4444ddc26dec020159f11ff640f.exe
-
Size
828KB
-
Sample
250110-ef5etstlcp
-
MD5
2f9ff2f250a639e72310b4ebc02054d7
-
SHA1
ddaa6f6ce1729f7cb390e89a91c200dc11aec4d0
-
SHA256
bc3f7e752971227983d7c0eec18816ae2dbdd4444ddc26dec020159f11ff640f
-
SHA512
7920a80dead2c84e7348813eb344bba991634a71c9f4d1089e555d4f02173bb96529bac8365319da821ed473ca5fb5733a19be756951077e7af5c782f4b41256
-
SSDEEP
12288:TviNmUgaxKEQo+Hg5GHYv63A26CLjNh6lSS3zRNJm8nZfN:Tv+DrsEQxgIHYv6wfah6lJjRuan
Behavioral task
behavioral1
Sample
bc3f7e752971227983d7c0eec18816ae2dbdd4444ddc26dec020159f11ff640f.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
bc3f7e752971227983d7c0eec18816ae2dbdd4444ddc26dec020159f11ff640f.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
bc3f7e752971227983d7c0eec18816ae2dbdd4444ddc26dec020159f11ff640f.exe
-
Size
828KB
-
MD5
2f9ff2f250a639e72310b4ebc02054d7
-
SHA1
ddaa6f6ce1729f7cb390e89a91c200dc11aec4d0
-
SHA256
bc3f7e752971227983d7c0eec18816ae2dbdd4444ddc26dec020159f11ff640f
-
SHA512
7920a80dead2c84e7348813eb344bba991634a71c9f4d1089e555d4f02173bb96529bac8365319da821ed473ca5fb5733a19be756951077e7af5c782f4b41256
-
SSDEEP
12288:TviNmUgaxKEQo+Hg5GHYv63A26CLjNh6lSS3zRNJm8nZfN:Tv+DrsEQxgIHYv6wfah6lJjRuan
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-