General
-
Target
1c281aad64e57aed57f78a3a35797381309c161e89e70a6803f3ec166fb29c19.exe
-
Size
828KB
-
Sample
250127-ehel7a1jck
-
MD5
46ab1dde1bac98a34cb41166f659db27
-
SHA1
f12b50ad32d9290d977322c7fb9594ac54d7b64a
-
SHA256
1c281aad64e57aed57f78a3a35797381309c161e89e70a6803f3ec166fb29c19
-
SHA512
4890f12e5fbd6f928936ccc2e2cd67414e339d4f2058b84a5cee73ad7600bc2dc5bf0368581781c047620abfa4df9e3fddcb9185f88222d574d6503f67d897b9
-
SSDEEP
12288:gF+JPdVQB7gH+F44vYVYJ21H3z2oLtubNUPX08fab:gFcVU7gG44vYVH1H/obyCb
Behavioral task
behavioral1
Sample
1c281aad64e57aed57f78a3a35797381309c161e89e70a6803f3ec166fb29c19.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1c281aad64e57aed57f78a3a35797381309c161e89e70a6803f3ec166fb29c19.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
1c281aad64e57aed57f78a3a35797381309c161e89e70a6803f3ec166fb29c19.exe
-
Size
828KB
-
MD5
46ab1dde1bac98a34cb41166f659db27
-
SHA1
f12b50ad32d9290d977322c7fb9594ac54d7b64a
-
SHA256
1c281aad64e57aed57f78a3a35797381309c161e89e70a6803f3ec166fb29c19
-
SHA512
4890f12e5fbd6f928936ccc2e2cd67414e339d4f2058b84a5cee73ad7600bc2dc5bf0368581781c047620abfa4df9e3fddcb9185f88222d574d6503f67d897b9
-
SSDEEP
12288:gF+JPdVQB7gH+F44vYVYJ21H3z2oLtubNUPX08fab:gFcVU7gG44vYVH1H/obyCb
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-