Overview
overview
10Static
static
1055ef6c766a...cN.exe
windows7-x64
1055ef6c766a...cN.exe
windows10-2004-x64
1055ef6c766a...cN.exe
android-9-x86
55ef6c766a...cN.exe
android-10-x64
55ef6c766a...cN.exe
android-11-x64
55ef6c766a...cN.exe
macos-10.15-amd64
55ef6c766a...cN.exe
ubuntu-18.04-amd64
55ef6c766a...cN.exe
debian-9-armhf
55ef6c766a...cN.exe
debian-9-mips
55ef6c766a...cN.exe
debian-9-mipsel
General
-
Target
55ef6c766af0ded94cf6feaa0a5b53d332ebb01e05e6dcdee03ec92bc2421ddcN.exe
-
Size
1.7MB
-
Sample
250113-f5d5lszrem
-
MD5
2709efc85a850a7ddb9ec3d228ef6640
-
SHA1
010165c876f030f0158b09d20af67238b954af66
-
SHA256
55ef6c766af0ded94cf6feaa0a5b53d332ebb01e05e6dcdee03ec92bc2421ddc
-
SHA512
de2741c12710609eb94a420ca2ff139d10e3783ced7ec827b3f30cba6824a81c23b2e8608fe3725f26c7beb816884720fcef689b9c78a4150228772352772de1
-
SSDEEP
24576:t3QwuLyEbVoCtPreIjNLoN/VNGeSQDx1m17zezKOkCzeJGFUJ:tgwuuEpdDLNwVMeXDL0fdSzAG
Behavioral task
behavioral1
Sample
55ef6c766af0ded94cf6feaa0a5b53d332ebb01e05e6dcdee03ec92bc2421ddcN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
55ef6c766af0ded94cf6feaa0a5b53d332ebb01e05e6dcdee03ec92bc2421ddcN.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
55ef6c766af0ded94cf6feaa0a5b53d332ebb01e05e6dcdee03ec92bc2421ddcN.exe
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral4
Sample
55ef6c766af0ded94cf6feaa0a5b53d332ebb01e05e6dcdee03ec92bc2421ddcN.exe
Resource
android-x64-20240624-en
Behavioral task
behavioral5
Sample
55ef6c766af0ded94cf6feaa0a5b53d332ebb01e05e6dcdee03ec92bc2421ddcN.exe
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral6
Sample
55ef6c766af0ded94cf6feaa0a5b53d332ebb01e05e6dcdee03ec92bc2421ddcN.exe
Resource
macos-20241101-en
Behavioral task
behavioral7
Sample
55ef6c766af0ded94cf6feaa0a5b53d332ebb01e05e6dcdee03ec92bc2421ddcN.exe
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral8
Sample
55ef6c766af0ded94cf6feaa0a5b53d332ebb01e05e6dcdee03ec92bc2421ddcN.exe
Resource
debian9-armhf-20240729-en
Behavioral task
behavioral9
Sample
55ef6c766af0ded94cf6feaa0a5b53d332ebb01e05e6dcdee03ec92bc2421ddcN.exe
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral10
Sample
55ef6c766af0ded94cf6feaa0a5b53d332ebb01e05e6dcdee03ec92bc2421ddcN.exe
Resource
debian9-mipsel-20240226-en
Malware Config
Targets
-
-
Target
55ef6c766af0ded94cf6feaa0a5b53d332ebb01e05e6dcdee03ec92bc2421ddcN.exe
-
Size
1.7MB
-
MD5
2709efc85a850a7ddb9ec3d228ef6640
-
SHA1
010165c876f030f0158b09d20af67238b954af66
-
SHA256
55ef6c766af0ded94cf6feaa0a5b53d332ebb01e05e6dcdee03ec92bc2421ddc
-
SHA512
de2741c12710609eb94a420ca2ff139d10e3783ced7ec827b3f30cba6824a81c23b2e8608fe3725f26c7beb816884720fcef689b9c78a4150228772352772de1
-
SSDEEP
24576:t3QwuLyEbVoCtPreIjNLoN/VNGeSQDx1m17zezKOkCzeJGFUJ:tgwuuEpdDLNwVMeXDL0fdSzAG
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-