General
-
Target
abd9f8aa3568761404062e820be47db1a3bcee625fcff0b2ce4ff4fe1bff983b
-
Size
1.7MB
-
Sample
250119-hlp4wazldr
-
MD5
92f20cf5b97297600b5272178b6534c7
-
SHA1
3d7b513aea13d6a7c7e66d0a74d0af11b8d7f625
-
SHA256
abd9f8aa3568761404062e820be47db1a3bcee625fcff0b2ce4ff4fe1bff983b
-
SHA512
81f0c12d78f958d1a1d74bd13ed015c878bef5a51040ab9346713a47626a58e163f6568b9f97803b18b49a583b5622c61fd065d9fe957af8763ce80edd3135c4
-
SSDEEP
49152:z+gYXZTD1VXUqzX7VwjvMoh1IFyuyigWnMzm6sDBKv:eTHUxUoh1IF9gl2
Behavioral task
behavioral1
Sample
abd9f8aa3568761404062e820be47db1a3bcee625fcff0b2ce4ff4fe1bff983b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
abd9f8aa3568761404062e820be47db1a3bcee625fcff0b2ce4ff4fe1bff983b.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
abd9f8aa3568761404062e820be47db1a3bcee625fcff0b2ce4ff4fe1bff983b
-
Size
1.7MB
-
MD5
92f20cf5b97297600b5272178b6534c7
-
SHA1
3d7b513aea13d6a7c7e66d0a74d0af11b8d7f625
-
SHA256
abd9f8aa3568761404062e820be47db1a3bcee625fcff0b2ce4ff4fe1bff983b
-
SHA512
81f0c12d78f958d1a1d74bd13ed015c878bef5a51040ab9346713a47626a58e163f6568b9f97803b18b49a583b5622c61fd065d9fe957af8763ce80edd3135c4
-
SSDEEP
49152:z+gYXZTD1VXUqzX7VwjvMoh1IFyuyigWnMzm6sDBKv:eTHUxUoh1IF9gl2
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-