General
-
Target
b1ed8df7e68c8e614b3dc1b91fde36e41d5564b9404c2e36f9d7b756790f2f13.exe
-
Size
1.7MB
-
Sample
250122-c6ntnavkbn
-
MD5
62b108ad83c4b340fe2bcad3cdaca141
-
SHA1
ddf933ec41d253e8ead1ce923762f8fcdf36cc2d
-
SHA256
b1ed8df7e68c8e614b3dc1b91fde36e41d5564b9404c2e36f9d7b756790f2f13
-
SHA512
1ed101896adcd32440e79b2bb425e9a5a9753c3bf6c6d11ef19b2525a93ae1316ecb779b2a6250318f34c3872d3c4de7e522050dda9516afc0f8e96d554cf76c
-
SSDEEP
49152:D+gYXZTD1VXUqzX7VwjvMoh1IFyuyigWnMzm6sDBKvt:uTHUxUoh1IF9gl20
Behavioral task
behavioral1
Sample
b1ed8df7e68c8e614b3dc1b91fde36e41d5564b9404c2e36f9d7b756790f2f13.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
b1ed8df7e68c8e614b3dc1b91fde36e41d5564b9404c2e36f9d7b756790f2f13.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
b1ed8df7e68c8e614b3dc1b91fde36e41d5564b9404c2e36f9d7b756790f2f13.exe
-
Size
1.7MB
-
MD5
62b108ad83c4b340fe2bcad3cdaca141
-
SHA1
ddf933ec41d253e8ead1ce923762f8fcdf36cc2d
-
SHA256
b1ed8df7e68c8e614b3dc1b91fde36e41d5564b9404c2e36f9d7b756790f2f13
-
SHA512
1ed101896adcd32440e79b2bb425e9a5a9753c3bf6c6d11ef19b2525a93ae1316ecb779b2a6250318f34c3872d3c4de7e522050dda9516afc0f8e96d554cf76c
-
SSDEEP
49152:D+gYXZTD1VXUqzX7VwjvMoh1IFyuyigWnMzm6sDBKvt:uTHUxUoh1IF9gl20
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-