General
-
Target
397de25eb509188dacf565de5903bcb4a29570d9d8af9069a56fb82d951798a7.exe
-
Size
1.7MB
-
Sample
250111-l5k6taylcn
-
MD5
a2dbf84e232d624efdbe3d587b42c9df
-
SHA1
c1938ad90a6403a6310560039dc8437f7664bcdb
-
SHA256
397de25eb509188dacf565de5903bcb4a29570d9d8af9069a56fb82d951798a7
-
SHA512
4082b89dce58e274cbb157af86d7d7670783a215d7c2f4871c8e5eb8bbf5002457b8b3bcd4b0bbf9aa30e333d390edb148e9e4d7b565ca69a571141721f8255d
-
SSDEEP
24576:N3QwuLyEbVoCtPreIjNLoN/VNGeSQDx1m17zezKOkCzeJGFUJc:NgwuuEpdDLNwVMeXDL0fdSzAG9
Behavioral task
behavioral1
Sample
397de25eb509188dacf565de5903bcb4a29570d9d8af9069a56fb82d951798a7.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
397de25eb509188dacf565de5903bcb4a29570d9d8af9069a56fb82d951798a7.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
397de25eb509188dacf565de5903bcb4a29570d9d8af9069a56fb82d951798a7.exe
-
Size
1.7MB
-
MD5
a2dbf84e232d624efdbe3d587b42c9df
-
SHA1
c1938ad90a6403a6310560039dc8437f7664bcdb
-
SHA256
397de25eb509188dacf565de5903bcb4a29570d9d8af9069a56fb82d951798a7
-
SHA512
4082b89dce58e274cbb157af86d7d7670783a215d7c2f4871c8e5eb8bbf5002457b8b3bcd4b0bbf9aa30e333d390edb148e9e4d7b565ca69a571141721f8255d
-
SSDEEP
24576:N3QwuLyEbVoCtPreIjNLoN/VNGeSQDx1m17zezKOkCzeJGFUJc:NgwuuEpdDLNwVMeXDL0fdSzAG9
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-