General
-
Target
f14e979398839caddd543261a8e9773bcd5a95d9f433e113ecdc8605cd3b2393.exe
-
Size
2.2MB
-
Sample
250129-d76xaszmgs
-
MD5
29329d17b110755ec3a04e157abb845c
-
SHA1
756fd244223a93ce2778fd7fb5558d9861328d01
-
SHA256
f14e979398839caddd543261a8e9773bcd5a95d9f433e113ecdc8605cd3b2393
-
SHA512
89c29661d31fad68c9eb6a96a105c32c0c5e620cafc7e028031dd6b5ea4a0693e5d200ec8afab2989a169f6530764ad1427d431e8d0864bb0dec63e302b8f06f
-
SSDEEP
24576:z2G/nvxW3WieCaKuZ3X4NGX254GP/gG22G/nvxW3WieCaKuZ3X4NGX254GP/gG3:zbA3jdKGMbA3jdKG5
Behavioral task
behavioral1
Sample
f14e979398839caddd543261a8e9773bcd5a95d9f433e113ecdc8605cd3b2393.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f14e979398839caddd543261a8e9773bcd5a95d9f433e113ecdc8605cd3b2393.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
f14e979398839caddd543261a8e9773bcd5a95d9f433e113ecdc8605cd3b2393.exe
-
Size
2.2MB
-
MD5
29329d17b110755ec3a04e157abb845c
-
SHA1
756fd244223a93ce2778fd7fb5558d9861328d01
-
SHA256
f14e979398839caddd543261a8e9773bcd5a95d9f433e113ecdc8605cd3b2393
-
SHA512
89c29661d31fad68c9eb6a96a105c32c0c5e620cafc7e028031dd6b5ea4a0693e5d200ec8afab2989a169f6530764ad1427d431e8d0864bb0dec63e302b8f06f
-
SSDEEP
24576:z2G/nvxW3WieCaKuZ3X4NGX254GP/gG22G/nvxW3WieCaKuZ3X4NGX254GP/gG3:zbA3jdKGMbA3jdKG5
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-