General
-
Target
93e35f881bc6e9f03a420d9ecfac81a0af3f71f10918eb9be5c33cb18d7f56c6.exe
-
Size
1.1MB
-
Sample
250121-n1h7rssnhl
-
MD5
8de0b1533dc90527d236cd6c854cbc24
-
SHA1
dd896192fcb96620c82dd1a8a0f94ca658e09f78
-
SHA256
93e35f881bc6e9f03a420d9ecfac81a0af3f71f10918eb9be5c33cb18d7f56c6
-
SHA512
33c279f2890ea572ea3f8921bb35648d7339eac2fd7d7f9f2548b43481fa0ffcee562879ecf521a5ff0b6679aa907731d93dbc45ce0fcb41ccb7fe4ae4762887
-
SSDEEP
24576:U2G/nvxW3Ww0tI2qYVrBvevwx8P9brkuXa:UbA30I2TvkPOX
Behavioral task
behavioral1
Sample
93e35f881bc6e9f03a420d9ecfac81a0af3f71f10918eb9be5c33cb18d7f56c6.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
93e35f881bc6e9f03a420d9ecfac81a0af3f71f10918eb9be5c33cb18d7f56c6.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
93e35f881bc6e9f03a420d9ecfac81a0af3f71f10918eb9be5c33cb18d7f56c6.exe
-
Size
1.1MB
-
MD5
8de0b1533dc90527d236cd6c854cbc24
-
SHA1
dd896192fcb96620c82dd1a8a0f94ca658e09f78
-
SHA256
93e35f881bc6e9f03a420d9ecfac81a0af3f71f10918eb9be5c33cb18d7f56c6
-
SHA512
33c279f2890ea572ea3f8921bb35648d7339eac2fd7d7f9f2548b43481fa0ffcee562879ecf521a5ff0b6679aa907731d93dbc45ce0fcb41ccb7fe4ae4762887
-
SSDEEP
24576:U2G/nvxW3Ww0tI2qYVrBvevwx8P9brkuXa:UbA30I2TvkPOX
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-