General
-
Target
3e6f4e16f8da924256118e6c9cdaa7f2.exe
-
Size
1.2MB
-
Sample
250126-adq27swrak
-
MD5
3e6f4e16f8da924256118e6c9cdaa7f2
-
SHA1
87b7927fb99d36a91b09ee9fa3807ef418a960b8
-
SHA256
8c3a7033ee06a047f453f22368007970407fdd15e73bca372c72f70cfb89b4ab
-
SHA512
b3df11ec860740a4ea874177cb222df715cc424b55df5454213c5b6a3ff6fb1d30e9bc9fd207afdeaff0e41961c694f915535c1fd64ab32d1066f5337193a69d
-
SSDEEP
24576:bmYejVvCekg5dxjMlM/R3DxnI2IbqvXTsb8:bmF4g9IUIN2r
Behavioral task
behavioral1
Sample
3e6f4e16f8da924256118e6c9cdaa7f2.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3e6f4e16f8da924256118e6c9cdaa7f2.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
3e6f4e16f8da924256118e6c9cdaa7f2.exe
-
Size
1.2MB
-
MD5
3e6f4e16f8da924256118e6c9cdaa7f2
-
SHA1
87b7927fb99d36a91b09ee9fa3807ef418a960b8
-
SHA256
8c3a7033ee06a047f453f22368007970407fdd15e73bca372c72f70cfb89b4ab
-
SHA512
b3df11ec860740a4ea874177cb222df715cc424b55df5454213c5b6a3ff6fb1d30e9bc9fd207afdeaff0e41961c694f915535c1fd64ab32d1066f5337193a69d
-
SSDEEP
24576:bmYejVvCekg5dxjMlM/R3DxnI2IbqvXTsb8:bmF4g9IUIN2r
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-