General
-
Target
pisonegro.exe
-
Size
1.2MB
-
Sample
250123-m1qfeaymdm
-
MD5
520e47b311f00975c4d3e7efb4233525
-
SHA1
5ddcdb8b9beb7bfcf4d53e2ecbd9f9637b23ec3a
-
SHA256
fad45be55844aba24256cc8d0bb7a944a6d3156311bb024849921ae1d27372af
-
SHA512
ac5795fdc0f2b60a7a3b4fbea18814b700061a0fcf148c73b67ba9477be502203862ab62f1f15bfdf622810d230355814a0414ca16befc3bfaf2cc8fca72968a
-
SSDEEP
24576:u2G/nvxW3WieCf/sKqceu7PcOa03engQw8mnM0g5FHt:ubA3jf/4ctastg5FN
Behavioral task
behavioral1
Sample
pisonegro.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
pisonegro.exe
-
Size
1.2MB
-
MD5
520e47b311f00975c4d3e7efb4233525
-
SHA1
5ddcdb8b9beb7bfcf4d53e2ecbd9f9637b23ec3a
-
SHA256
fad45be55844aba24256cc8d0bb7a944a6d3156311bb024849921ae1d27372af
-
SHA512
ac5795fdc0f2b60a7a3b4fbea18814b700061a0fcf148c73b67ba9477be502203862ab62f1f15bfdf622810d230355814a0414ca16befc3bfaf2cc8fca72968a
-
SSDEEP
24576:u2G/nvxW3WieCf/sKqceu7PcOa03engQw8mnM0g5FHt:ubA3jf/4ctastg5FN
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-