General
-
Target
DCRatBuild.exe
-
Size
1.5MB
-
Sample
250119-n31jtswlg1
-
MD5
2dfe08213d4a88f84c8e6e55b1baf0fa
-
SHA1
0840c87abf9b8f5bd39a590ac3be226d6cf125a3
-
SHA256
05f3d9ce16eba5ebb4ed29d62529eeec7c533f0ec87f97f14f2b7f46969e0061
-
SHA512
e327ebcf5b9d83204511587ee01102f88a4564d5e048cc4bff43098e98b08d4bf29cbb2e28a073d732075c4469cce0b3bd6b5f711f26beba8af587f9120f7900
-
SSDEEP
24576:U2G/nvxW3Ww0t0nvhF84x1Ew037zQMG9iw3g21vWzKaShD9YrBy64bU:UbA30SvE4xwU9iKg21SdSwVym
Behavioral task
behavioral1
Sample
DCRatBuild.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
DCRatBuild.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
DCRatBuild.exe
-
Size
1.5MB
-
MD5
2dfe08213d4a88f84c8e6e55b1baf0fa
-
SHA1
0840c87abf9b8f5bd39a590ac3be226d6cf125a3
-
SHA256
05f3d9ce16eba5ebb4ed29d62529eeec7c533f0ec87f97f14f2b7f46969e0061
-
SHA512
e327ebcf5b9d83204511587ee01102f88a4564d5e048cc4bff43098e98b08d4bf29cbb2e28a073d732075c4469cce0b3bd6b5f711f26beba8af587f9120f7900
-
SSDEEP
24576:U2G/nvxW3Ww0t0nvhF84x1Ew037zQMG9iw3g21vWzKaShD9YrBy64bU:UbA30SvE4xwU9iKg21SdSwVym
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-