General
-
Target
eba23ee4fa3441dd8972973ac7665007.exe
-
Size
828KB
-
Sample
250110-g92bdaxpdm
-
MD5
eba23ee4fa3441dd8972973ac7665007
-
SHA1
a8416561dd666fbeb01688ea9e17dc2cfae18a24
-
SHA256
d239fc2c02176544f563b8af3a91751613a9c1e85e36372c49ed132976888259
-
SHA512
c209b7d8535b5be51dd56fecade2f8ea6b853d48d45877ba9ea708face3031ed01ad85d4ac42a7ffb93568c1f2c58475e8f1fa07f54c5321dd44a5bc8ff53e96
-
SSDEEP
12288:qTwIZR2pvarT1TZnszQGEfIjvOOK2elbuXH82x7F:iZR2pvmpszQcvOOeYsaF
Behavioral task
behavioral1
Sample
eba23ee4fa3441dd8972973ac7665007.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
eba23ee4fa3441dd8972973ac7665007.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
eba23ee4fa3441dd8972973ac7665007.exe
-
Size
828KB
-
MD5
eba23ee4fa3441dd8972973ac7665007
-
SHA1
a8416561dd666fbeb01688ea9e17dc2cfae18a24
-
SHA256
d239fc2c02176544f563b8af3a91751613a9c1e85e36372c49ed132976888259
-
SHA512
c209b7d8535b5be51dd56fecade2f8ea6b853d48d45877ba9ea708face3031ed01ad85d4ac42a7ffb93568c1f2c58475e8f1fa07f54c5321dd44a5bc8ff53e96
-
SSDEEP
12288:qTwIZR2pvarT1TZnszQGEfIjvOOK2elbuXH82x7F:iZR2pvmpszQcvOOeYsaF
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-