General
-
Target
d34707502943b1fcb2eaf5f3b85a6a5d4809458680101aca4ad6a355c4925885.exe
-
Size
2.5MB
-
Sample
250120-n6k9baxqhx
-
MD5
dbb2561808f77df19c729393b7e2c004
-
SHA1
d06044c1eb2f286017e03b02e389cca516c55fc0
-
SHA256
d34707502943b1fcb2eaf5f3b85a6a5d4809458680101aca4ad6a355c4925885
-
SHA512
54e8959bfc848bad7c2f97eacc8635e0316b68befd0bfa769b07c0216f2e89b84e4d187df15deeda2abbec95266083199879ddf2b8c88985ff79b22c8948b06f
-
SSDEEP
49152:BTmiAznN8OLA03GMjKoZYz+WqE3GMAsH4wDnyBMzTvAaULscNpVQPUmXqO:0iAzSOLA0cooNrkSD6brVlU
Static task
static1
Behavioral task
behavioral1
Sample
d34707502943b1fcb2eaf5f3b85a6a5d4809458680101aca4ad6a355c4925885.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
d34707502943b1fcb2eaf5f3b85a6a5d4809458680101aca4ad6a355c4925885.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
d34707502943b1fcb2eaf5f3b85a6a5d4809458680101aca4ad6a355c4925885.exe
-
Size
2.5MB
-
MD5
dbb2561808f77df19c729393b7e2c004
-
SHA1
d06044c1eb2f286017e03b02e389cca516c55fc0
-
SHA256
d34707502943b1fcb2eaf5f3b85a6a5d4809458680101aca4ad6a355c4925885
-
SHA512
54e8959bfc848bad7c2f97eacc8635e0316b68befd0bfa769b07c0216f2e89b84e4d187df15deeda2abbec95266083199879ddf2b8c88985ff79b22c8948b06f
-
SSDEEP
49152:BTmiAznN8OLA03GMjKoZYz+WqE3GMAsH4wDnyBMzTvAaULscNpVQPUmXqO:0iAzSOLA0cooNrkSD6brVlU
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-