General
-
Target
46f77240e4a469bf38e0600e95edf6de249ede13f5a41de3702af584a69b7761.exe
-
Size
1.1MB
-
Sample
250113-cptzcatlck
-
MD5
bae83c597a9f76e1a42b833f108c8c9a
-
SHA1
c0be6ab84266d366d22b28c5bc0d68f2be525fc1
-
SHA256
46f77240e4a469bf38e0600e95edf6de249ede13f5a41de3702af584a69b7761
-
SHA512
0b72794bc1d6ce47406a7fc4a12b1a0107633882cb06387f6abe9ef6480a93381bed71ac254e8bfdfa434b65f04419136e4ff992346f420f289075c48484715e
-
SSDEEP
24576:K2G/nvxW3WHKfhIVMjZs1LtHoFJS32TpfXVH:KbA3xZ0Mj6g3
Behavioral task
behavioral1
Sample
46f77240e4a469bf38e0600e95edf6de249ede13f5a41de3702af584a69b7761.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
46f77240e4a469bf38e0600e95edf6de249ede13f5a41de3702af584a69b7761.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
46f77240e4a469bf38e0600e95edf6de249ede13f5a41de3702af584a69b7761.exe
-
Size
1.1MB
-
MD5
bae83c597a9f76e1a42b833f108c8c9a
-
SHA1
c0be6ab84266d366d22b28c5bc0d68f2be525fc1
-
SHA256
46f77240e4a469bf38e0600e95edf6de249ede13f5a41de3702af584a69b7761
-
SHA512
0b72794bc1d6ce47406a7fc4a12b1a0107633882cb06387f6abe9ef6480a93381bed71ac254e8bfdfa434b65f04419136e4ff992346f420f289075c48484715e
-
SSDEEP
24576:K2G/nvxW3WHKfhIVMjZs1LtHoFJS32TpfXVH:KbA3xZ0Mj6g3
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Disables Task Manager via registry modification
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-