General
-
Target
9dec0c7146d6ef962682852c34afe177826f2560a33f59150843b46985530cc7
-
Size
1.7MB
-
Sample
250115-fzcdtsskg1
-
MD5
2ee8bf268f50f97db5231d71e3023c37
-
SHA1
0dd823f60b08b9b307c4be5f59c3b275caa2e1d5
-
SHA256
9dec0c7146d6ef962682852c34afe177826f2560a33f59150843b46985530cc7
-
SHA512
294877dccd8c04d4c134ca29a9ebebe746f4b4a67bd7761cd581f27fcfe6a7b0866cde35d1c819e1f63b9fb829424e6d77711a494427ea73b84c53b48a2d6f0a
-
SSDEEP
49152:T+gYXZTD1VXUqzX7VwjvMoh1IFyuyigWnMzm6sDBKv:+THUxUoh1IF9gl2
Behavioral task
behavioral1
Sample
9dec0c7146d6ef962682852c34afe177826f2560a33f59150843b46985530cc7.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9dec0c7146d6ef962682852c34afe177826f2560a33f59150843b46985530cc7.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
9dec0c7146d6ef962682852c34afe177826f2560a33f59150843b46985530cc7
-
Size
1.7MB
-
MD5
2ee8bf268f50f97db5231d71e3023c37
-
SHA1
0dd823f60b08b9b307c4be5f59c3b275caa2e1d5
-
SHA256
9dec0c7146d6ef962682852c34afe177826f2560a33f59150843b46985530cc7
-
SHA512
294877dccd8c04d4c134ca29a9ebebe746f4b4a67bd7761cd581f27fcfe6a7b0866cde35d1c819e1f63b9fb829424e6d77711a494427ea73b84c53b48a2d6f0a
-
SSDEEP
49152:T+gYXZTD1VXUqzX7VwjvMoh1IFyuyigWnMzm6sDBKv:+THUxUoh1IF9gl2
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-