General
-
Target
9a5b5447b67c7f165689b1e1c5f65f92663425b527aacc4d9ec73e66d29e2692N.exe
-
Size
1.1MB
-
Sample
250121-d4f7gavjay
-
MD5
d2f57cf55387c9146158f49dbcf5b540
-
SHA1
57fb9892bdf6362073eb3cb1452a291568b49e23
-
SHA256
9a5b5447b67c7f165689b1e1c5f65f92663425b527aacc4d9ec73e66d29e2692
-
SHA512
5d2da7dcbe87ceee345b95d99fc47a209a5621c88483fdb3484493f75fe0e8cc5802703dcd44e068a83738401b7e6a8edaeef7b098a804ae4989ccfb2ef4f78e
-
SSDEEP
24576:U2G/nvxW3Ww0tI2qYVrBvevwx8P9brkuXq:UbA30I2TvkPOf
Behavioral task
behavioral1
Sample
9a5b5447b67c7f165689b1e1c5f65f92663425b527aacc4d9ec73e66d29e2692N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9a5b5447b67c7f165689b1e1c5f65f92663425b527aacc4d9ec73e66d29e2692N.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
9a5b5447b67c7f165689b1e1c5f65f92663425b527aacc4d9ec73e66d29e2692N.exe
-
Size
1.1MB
-
MD5
d2f57cf55387c9146158f49dbcf5b540
-
SHA1
57fb9892bdf6362073eb3cb1452a291568b49e23
-
SHA256
9a5b5447b67c7f165689b1e1c5f65f92663425b527aacc4d9ec73e66d29e2692
-
SHA512
5d2da7dcbe87ceee345b95d99fc47a209a5621c88483fdb3484493f75fe0e8cc5802703dcd44e068a83738401b7e6a8edaeef7b098a804ae4989ccfb2ef4f78e
-
SSDEEP
24576:U2G/nvxW3Ww0tI2qYVrBvevwx8P9brkuXq:UbA30I2TvkPOf
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-