General
-
Target
ec28f3527cbf73f5d284739eb21c9dccb40c432e377b17b550c67ce377bdf06e.exe
-
Size
1.7MB
-
Sample
250116-jlkpts1kbj
-
MD5
60b616116be77dbf109954260772aa40
-
SHA1
3d6df410f548e1936313e1835d0b2f893f827689
-
SHA256
ec28f3527cbf73f5d284739eb21c9dccb40c432e377b17b550c67ce377bdf06e
-
SHA512
89efc0c5f3279870127d2c847aa1dc02d29d0e4d3ae1f31c02ff5ae4c556a04ed57abda424f6fa04c3c2b3cf889bf08d7df53858f5bccf16b433d3c530c37363
-
SSDEEP
24576:j3QwuLyEbVoCtPreIjNLoN/VNGeSQDx1m17zezKOkCzeJGFUJN:jgwuuEpdDLNwVMeXDL0fdSzAGM
Behavioral task
behavioral1
Sample
ec28f3527cbf73f5d284739eb21c9dccb40c432e377b17b550c67ce377bdf06e.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ec28f3527cbf73f5d284739eb21c9dccb40c432e377b17b550c67ce377bdf06e.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
ec28f3527cbf73f5d284739eb21c9dccb40c432e377b17b550c67ce377bdf06e.exe
-
Size
1.7MB
-
MD5
60b616116be77dbf109954260772aa40
-
SHA1
3d6df410f548e1936313e1835d0b2f893f827689
-
SHA256
ec28f3527cbf73f5d284739eb21c9dccb40c432e377b17b550c67ce377bdf06e
-
SHA512
89efc0c5f3279870127d2c847aa1dc02d29d0e4d3ae1f31c02ff5ae4c556a04ed57abda424f6fa04c3c2b3cf889bf08d7df53858f5bccf16b433d3c530c37363
-
SSDEEP
24576:j3QwuLyEbVoCtPreIjNLoN/VNGeSQDx1m17zezKOkCzeJGFUJN:jgwuuEpdDLNwVMeXDL0fdSzAGM
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-