General
-
Target
agenthostcommon.exe
-
Size
1.2MB
-
Sample
250118-ap51haykbr
-
MD5
0e7963961186fa0563efbb7e2312034d
-
SHA1
966dd343e1a5760aa2d4b27f5e920bc1d0e53430
-
SHA256
b6d9acc3a43dd4897b59998c426db1af0d59f4b86b7a27d923adf32b2d643b65
-
SHA512
816050bf913c0c431a03e85a578e7aae6a4e1030d179d4501c732bc04c238d9133c8cd7d60db52610adc71f11cee67c5124a944e521cee58ace1bd9760a50236
-
SSDEEP
24576:TsabRr96PUyifNzW657ZcGUOXTjieEVFpZ9867SgxeU1nS9x8ANI7y5:DR0U5xgOFsbP7Bxe0S74y
Behavioral task
behavioral1
Sample
agenthostcommon.exe
Resource
win10ltsc2021-20250113-en
Malware Config
Targets
-
-
Target
agenthostcommon.exe
-
Size
1.2MB
-
MD5
0e7963961186fa0563efbb7e2312034d
-
SHA1
966dd343e1a5760aa2d4b27f5e920bc1d0e53430
-
SHA256
b6d9acc3a43dd4897b59998c426db1af0d59f4b86b7a27d923adf32b2d643b65
-
SHA512
816050bf913c0c431a03e85a578e7aae6a4e1030d179d4501c732bc04c238d9133c8cd7d60db52610adc71f11cee67c5124a944e521cee58ace1bd9760a50236
-
SSDEEP
24576:TsabRr96PUyifNzW657ZcGUOXTjieEVFpZ9867SgxeU1nS9x8ANI7y5:DR0U5xgOFsbP7Bxe0S74y
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-