Resubmissions
14-01-2025 03:03
250114-dkgznaxmaq 10General
-
Target
b56efb3ca8906a817613e7e0899cffa1f5d23d39164153dc2567cf10a0314fb4.exe
-
Size
6.5MB
-
Sample
250114-dkgznaxmaq
-
MD5
dd045e7803ef620069b0e90d9128375f
-
SHA1
983de7fc238cac0de7b2d74b86617501dbbfc9c6
-
SHA256
b56efb3ca8906a817613e7e0899cffa1f5d23d39164153dc2567cf10a0314fb4
-
SHA512
3ef80acad4b09dbb84835520f249c3970f0574156e77155f496dddb46927d407773315f34c4c38277e34825ac6401159b5df06776140b20fb9f820f0a4859886
-
SSDEEP
196608:nuaAxSTZLvD6/x1R92cJUMo7xS6eUEMW42:nRAh5n9/GMolS6eyWZ
Static task
static1
Behavioral task
behavioral1
Sample
b56efb3ca8906a817613e7e0899cffa1f5d23d39164153dc2567cf10a0314fb4.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b56efb3ca8906a817613e7e0899cffa1f5d23d39164153dc2567cf10a0314fb4.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
b56efb3ca8906a817613e7e0899cffa1f5d23d39164153dc2567cf10a0314fb4.exe
-
Size
6.5MB
-
MD5
dd045e7803ef620069b0e90d9128375f
-
SHA1
983de7fc238cac0de7b2d74b86617501dbbfc9c6
-
SHA256
b56efb3ca8906a817613e7e0899cffa1f5d23d39164153dc2567cf10a0314fb4
-
SHA512
3ef80acad4b09dbb84835520f249c3970f0574156e77155f496dddb46927d407773315f34c4c38277e34825ac6401159b5df06776140b20fb9f820f0a4859886
-
SSDEEP
196608:nuaAxSTZLvD6/x1R92cJUMo7xS6eUEMW42:nRAh5n9/GMolS6eyWZ
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
DCRat payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-