General
-
Target
41fbd73eb45783d323558185ed38027ec0cb64bb37729328ce12d8dd670de309.exe
-
Size
2.3MB
-
Sample
250117-pmqv5axrgn
-
MD5
1e83ded2729ce777053c604e7d667c38
-
SHA1
e4de4580f9e80703961c6df8b3dc687d6ff16cda
-
SHA256
41fbd73eb45783d323558185ed38027ec0cb64bb37729328ce12d8dd670de309
-
SHA512
6c032fee11131744a6234b9011e700faa12aaa194afc8d32f1206d61bbe397b7b4f9f278192e32883379e0ecb178b1aedf426285745c23a127e9db2495867ad1
-
SSDEEP
49152:P581k6pWQwY9zhWLCGUdeuGMvLq0jvYQxkm:P58C6pgTEO0jvYQR
Behavioral task
behavioral1
Sample
41fbd73eb45783d323558185ed38027ec0cb64bb37729328ce12d8dd670de309.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
41fbd73eb45783d323558185ed38027ec0cb64bb37729328ce12d8dd670de309.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
41fbd73eb45783d323558185ed38027ec0cb64bb37729328ce12d8dd670de309.exe
-
Size
2.3MB
-
MD5
1e83ded2729ce777053c604e7d667c38
-
SHA1
e4de4580f9e80703961c6df8b3dc687d6ff16cda
-
SHA256
41fbd73eb45783d323558185ed38027ec0cb64bb37729328ce12d8dd670de309
-
SHA512
6c032fee11131744a6234b9011e700faa12aaa194afc8d32f1206d61bbe397b7b4f9f278192e32883379e0ecb178b1aedf426285745c23a127e9db2495867ad1
-
SSDEEP
49152:P581k6pWQwY9zhWLCGUdeuGMvLq0jvYQxkm:P58C6pgTEO0jvYQR
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-