General
-
Target
b132f19ab5f81b1b7fa86d8b35b1d8b69d0c10c097f817727625534bd4d1eb12.exe
-
Size
1.7MB
-
Sample
250110-y5qgrawjbz
-
MD5
5f8fd8f1e910dd9061f1a5a1c3bf1f76
-
SHA1
b6c997850b6358dea95e1c80f6920a57fb5098d4
-
SHA256
b132f19ab5f81b1b7fa86d8b35b1d8b69d0c10c097f817727625534bd4d1eb12
-
SHA512
efb4c860977a40978536b746ec5b372ca23c3fefd1b9a44ad1356fad414a0cfcf4695c7ba6c8b4a9f1c7242e7d72e81b0e9cf1686c08e265a493276be64149ab
-
SSDEEP
24576:t3QwuLyEbVoCtPreIjNLoN/VNGeSQDx1m17zezKOkCzeJGFUJ6:tgwuuEpdDLNwVMeXDL0fdSzAGr
Behavioral task
behavioral1
Sample
b132f19ab5f81b1b7fa86d8b35b1d8b69d0c10c097f817727625534bd4d1eb12.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b132f19ab5f81b1b7fa86d8b35b1d8b69d0c10c097f817727625534bd4d1eb12.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
b132f19ab5f81b1b7fa86d8b35b1d8b69d0c10c097f817727625534bd4d1eb12.exe
-
Size
1.7MB
-
MD5
5f8fd8f1e910dd9061f1a5a1c3bf1f76
-
SHA1
b6c997850b6358dea95e1c80f6920a57fb5098d4
-
SHA256
b132f19ab5f81b1b7fa86d8b35b1d8b69d0c10c097f817727625534bd4d1eb12
-
SHA512
efb4c860977a40978536b746ec5b372ca23c3fefd1b9a44ad1356fad414a0cfcf4695c7ba6c8b4a9f1c7242e7d72e81b0e9cf1686c08e265a493276be64149ab
-
SSDEEP
24576:t3QwuLyEbVoCtPreIjNLoN/VNGeSQDx1m17zezKOkCzeJGFUJ6:tgwuuEpdDLNwVMeXDL0fdSzAGr
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-