General
-
Target
edb7c41437f94c8941985169d46a079c70c10f0be1f58faf8751895541414322.exe
-
Size
1.7MB
-
Sample
250121-b4csyazlbq
-
MD5
70cce5da5f92bbe6d8cb1d38b7071a61
-
SHA1
3aa3958772bec55307a2181982f063415278e761
-
SHA256
edb7c41437f94c8941985169d46a079c70c10f0be1f58faf8751895541414322
-
SHA512
959b63af4e19cafa2be83a63eda2bf8192c779a70772372b42e1954786d292b2991278e3221f29e25dd9ea4f88801d177e81a79340d8ed548453b51888cafaba
-
SSDEEP
24576:t3QwuLyEbVoCtPreIjNLoN/VNGeSQDx1m17zezKOkCzeJGFUJK:tgwuuEpdDLNwVMeXDL0fdSzAGf
Behavioral task
behavioral1
Sample
edb7c41437f94c8941985169d46a079c70c10f0be1f58faf8751895541414322.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
edb7c41437f94c8941985169d46a079c70c10f0be1f58faf8751895541414322.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
edb7c41437f94c8941985169d46a079c70c10f0be1f58faf8751895541414322.exe
-
Size
1.7MB
-
MD5
70cce5da5f92bbe6d8cb1d38b7071a61
-
SHA1
3aa3958772bec55307a2181982f063415278e761
-
SHA256
edb7c41437f94c8941985169d46a079c70c10f0be1f58faf8751895541414322
-
SHA512
959b63af4e19cafa2be83a63eda2bf8192c779a70772372b42e1954786d292b2991278e3221f29e25dd9ea4f88801d177e81a79340d8ed548453b51888cafaba
-
SSDEEP
24576:t3QwuLyEbVoCtPreIjNLoN/VNGeSQDx1m17zezKOkCzeJGFUJK:tgwuuEpdDLNwVMeXDL0fdSzAGf
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-