General
-
Target
5a0a10f6b1fdbfa50ad78bc71702a21275cedc7c7da7171e4ca86b01314e0617.exe
-
Size
1.7MB
-
Sample
250120-fyqj3asrbv
-
MD5
53c51f410e619914de7f9dda8c18da66
-
SHA1
5da42c476ccf634dc842e68c6af360f0831e472a
-
SHA256
5a0a10f6b1fdbfa50ad78bc71702a21275cedc7c7da7171e4ca86b01314e0617
-
SHA512
3a93a35a781a17dcd45dd74b79cb52c0bc15d9320ac44c47d1e1a97e644aa4bb1f9977b32d8de6a070bd8753646b1889f04f9a5b95fc6829be1b6c43247beb1c
-
SSDEEP
24576:t3QwuLyEbVoCtPreIjNLoN/VNGeSQDx1m17zezKOkCzeJGFUJg:tgwuuEpdDLNwVMeXDL0fdSzAGD
Behavioral task
behavioral1
Sample
5a0a10f6b1fdbfa50ad78bc71702a21275cedc7c7da7171e4ca86b01314e0617.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5a0a10f6b1fdbfa50ad78bc71702a21275cedc7c7da7171e4ca86b01314e0617.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
5a0a10f6b1fdbfa50ad78bc71702a21275cedc7c7da7171e4ca86b01314e0617.exe
-
Size
1.7MB
-
MD5
53c51f410e619914de7f9dda8c18da66
-
SHA1
5da42c476ccf634dc842e68c6af360f0831e472a
-
SHA256
5a0a10f6b1fdbfa50ad78bc71702a21275cedc7c7da7171e4ca86b01314e0617
-
SHA512
3a93a35a781a17dcd45dd74b79cb52c0bc15d9320ac44c47d1e1a97e644aa4bb1f9977b32d8de6a070bd8753646b1889f04f9a5b95fc6829be1b6c43247beb1c
-
SSDEEP
24576:t3QwuLyEbVoCtPreIjNLoN/VNGeSQDx1m17zezKOkCzeJGFUJg:tgwuuEpdDLNwVMeXDL0fdSzAGD
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-