General
-
Target
Surrogatefont.exe
-
Size
828KB
-
Sample
250112-bac7lszldn
-
MD5
056cc17e4b9ae9299079c6fc289dc195
-
SHA1
a8926b4bc2a32a8b1247c90d4929ab995aab7d06
-
SHA256
989dc2b004b38f140c0fe929167166e28ac3c93d90649800f07e7b8fb5f8ef75
-
SHA512
bdd234f576382ea0a5ec9f088af84286c4d422ca895a9369fe770f95b070789e7ea93ee7539af12c268ad8b3b42c39321b58d5a0f9e13a1245539bdd08f235e7
-
SSDEEP
12288:9Z6s1lxrBkn2VJsXVme/nMRIplGAT25CjMJmk:y2rBknhFmCyikCjMEk
Behavioral task
behavioral1
Sample
Surrogatefont.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Surrogatefont.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
Surrogatefont.exe
-
Size
828KB
-
MD5
056cc17e4b9ae9299079c6fc289dc195
-
SHA1
a8926b4bc2a32a8b1247c90d4929ab995aab7d06
-
SHA256
989dc2b004b38f140c0fe929167166e28ac3c93d90649800f07e7b8fb5f8ef75
-
SHA512
bdd234f576382ea0a5ec9f088af84286c4d422ca895a9369fe770f95b070789e7ea93ee7539af12c268ad8b3b42c39321b58d5a0f9e13a1245539bdd08f235e7
-
SSDEEP
12288:9Z6s1lxrBkn2VJsXVme/nMRIplGAT25CjMJmk:y2rBknhFmCyikCjMEk
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-