General
-
Target
eae062b9aa062793a84a0c5b60223aab93f29f995de6250720610ba248945162.exe
-
Size
829KB
-
Sample
250117-hr2pvswqdl
-
MD5
39080b718b5fd386e181eae293d3dd8e
-
SHA1
d08ff7cf2dd523b14453fc3a2403fc08adc8185e
-
SHA256
eae062b9aa062793a84a0c5b60223aab93f29f995de6250720610ba248945162
-
SHA512
11744429f505482bd88d17947ef192f468966b7d7b875ed67ae7a908313f300ef0bbf9cb326d526a169a93c23fa7417bb71a04bd9fa07d6bd5ef9e37f9987aff
-
SSDEEP
12288:KowrLE6IKSq9aZxoHH6+LsHmRWR1httY5B2ycgPATuUc4wGOx:KoevIKSq9aZ46+LR2YeyPPUy4tOx
Behavioral task
behavioral1
Sample
eae062b9aa062793a84a0c5b60223aab93f29f995de6250720610ba248945162.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eae062b9aa062793a84a0c5b60223aab93f29f995de6250720610ba248945162.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
eae062b9aa062793a84a0c5b60223aab93f29f995de6250720610ba248945162.exe
-
Size
829KB
-
MD5
39080b718b5fd386e181eae293d3dd8e
-
SHA1
d08ff7cf2dd523b14453fc3a2403fc08adc8185e
-
SHA256
eae062b9aa062793a84a0c5b60223aab93f29f995de6250720610ba248945162
-
SHA512
11744429f505482bd88d17947ef192f468966b7d7b875ed67ae7a908313f300ef0bbf9cb326d526a169a93c23fa7417bb71a04bd9fa07d6bd5ef9e37f9987aff
-
SSDEEP
12288:KowrLE6IKSq9aZxoHH6+LsHmRWR1httY5B2ycgPATuUc4wGOx:KoevIKSq9aZ46+LR2YeyPPUy4tOx
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-