General
-
Target
786ef385538288e14f110e576ccdbd9ca40b6305d7fb80760c99f8e1a0750216N.exe
-
Size
2.0MB
-
Sample
250123-hma2cayqbm
-
MD5
d0a2079bcfdad884762f8283dcc3eb50
-
SHA1
2f7c0d9d5c8a185e2fff72ecec2ffd8ff33ca845
-
SHA256
786ef385538288e14f110e576ccdbd9ca40b6305d7fb80760c99f8e1a0750216
-
SHA512
0db54130b2b33374e3ad742b3f8eed7cd762a31521b4c39c19e12b2d606deb3a8113c347c54f0a41f90d544a1f01e666d6c64a3fbbeb60a42eb27e466e9382ea
-
SSDEEP
24576:YIWvTgWtxIEUy/N3VfEj2kiGJrgnhU66dtZyXSt1Q65bNAJO4f6/NJmlEUDAS9gd:YIWTxhVG7ohU665Y0JbNm8mkjYLy
Static task
static1
Behavioral task
behavioral1
Sample
786ef385538288e14f110e576ccdbd9ca40b6305d7fb80760c99f8e1a0750216N.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
786ef385538288e14f110e576ccdbd9ca40b6305d7fb80760c99f8e1a0750216N.exe
-
Size
2.0MB
-
MD5
d0a2079bcfdad884762f8283dcc3eb50
-
SHA1
2f7c0d9d5c8a185e2fff72ecec2ffd8ff33ca845
-
SHA256
786ef385538288e14f110e576ccdbd9ca40b6305d7fb80760c99f8e1a0750216
-
SHA512
0db54130b2b33374e3ad742b3f8eed7cd762a31521b4c39c19e12b2d606deb3a8113c347c54f0a41f90d544a1f01e666d6c64a3fbbeb60a42eb27e466e9382ea
-
SSDEEP
24576:YIWvTgWtxIEUy/N3VfEj2kiGJrgnhU66dtZyXSt1Q65bNAJO4f6/NJmlEUDAS9gd:YIWTxhVG7ohU665Y0JbNm8mkjYLy
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-