General
-
Target
d0ceb28e119c7ddf3c430069e78ad0e62932d4a16e170053004169b728035ffaN.exe
-
Size
1.7MB
-
Sample
250117-gjthvavmbm
-
MD5
a57180c018c00cc79851ec0f0d1e8c60
-
SHA1
7f7c520837cab4b928bb8c22866d244cebc38025
-
SHA256
d0ceb28e119c7ddf3c430069e78ad0e62932d4a16e170053004169b728035ffa
-
SHA512
7f7574fda66c356d318ba0c99bbd6fb37f3fb320521eeb2db802a08b5d0ab30f7ed2da14bf0253be27845b8f48cb5daa90526d2f7bc225b1d728922265848cb6
-
SSDEEP
24576:t3QwuLyEbVoCtPreIjNLoN/VNGeSQDx1m17zezKOkCzeJGFUJ:tgwuuEpdDLNwVMeXDL0fdSzAG
Behavioral task
behavioral1
Sample
d0ceb28e119c7ddf3c430069e78ad0e62932d4a16e170053004169b728035ffaN.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
d0ceb28e119c7ddf3c430069e78ad0e62932d4a16e170053004169b728035ffaN.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
d0ceb28e119c7ddf3c430069e78ad0e62932d4a16e170053004169b728035ffaN.exe
-
Size
1.7MB
-
MD5
a57180c018c00cc79851ec0f0d1e8c60
-
SHA1
7f7c520837cab4b928bb8c22866d244cebc38025
-
SHA256
d0ceb28e119c7ddf3c430069e78ad0e62932d4a16e170053004169b728035ffa
-
SHA512
7f7574fda66c356d318ba0c99bbd6fb37f3fb320521eeb2db802a08b5d0ab30f7ed2da14bf0253be27845b8f48cb5daa90526d2f7bc225b1d728922265848cb6
-
SSDEEP
24576:t3QwuLyEbVoCtPreIjNLoN/VNGeSQDx1m17zezKOkCzeJGFUJ:tgwuuEpdDLNwVMeXDL0fdSzAG
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-