General
-
Target
fc7c1ae206763de95cdfd31d847ca4a6ecdcd0ee4d1fa30dc6c9e29d6f85877f.exe
-
Size
2.0MB
-
Sample
250129-ean6nasrdq
-
MD5
15af6864baf346e9b5fa1430a056e1a8
-
SHA1
5ad0dfff7f611bb92ee3d3f24323f4dd9c7d5562
-
SHA256
fc7c1ae206763de95cdfd31d847ca4a6ecdcd0ee4d1fa30dc6c9e29d6f85877f
-
SHA512
aa9c756d9112da082f097f54d0e49b6229639a0e35277dbd560f7623aa01603b542db06d50bfea298e45b66212b32b7677d5d1ab20c75c275e32f743c26bf495
-
SSDEEP
24576:BhnLIfy0Y3sDsvEeuXKWdd0wrT8aF/2FFL64FHFEVI1PYAXFeTiEHyG0GieYAOe/:fgNPZdzkaFO7WeYgFeGESG01eYAU7Y
Static task
static1
Behavioral task
behavioral1
Sample
fc7c1ae206763de95cdfd31d847ca4a6ecdcd0ee4d1fa30dc6c9e29d6f85877f.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
fc7c1ae206763de95cdfd31d847ca4a6ecdcd0ee4d1fa30dc6c9e29d6f85877f.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
fc7c1ae206763de95cdfd31d847ca4a6ecdcd0ee4d1fa30dc6c9e29d6f85877f.exe
-
Size
2.0MB
-
MD5
15af6864baf346e9b5fa1430a056e1a8
-
SHA1
5ad0dfff7f611bb92ee3d3f24323f4dd9c7d5562
-
SHA256
fc7c1ae206763de95cdfd31d847ca4a6ecdcd0ee4d1fa30dc6c9e29d6f85877f
-
SHA512
aa9c756d9112da082f097f54d0e49b6229639a0e35277dbd560f7623aa01603b542db06d50bfea298e45b66212b32b7677d5d1ab20c75c275e32f743c26bf495
-
SSDEEP
24576:BhnLIfy0Y3sDsvEeuXKWdd0wrT8aF/2FFL64FHFEVI1PYAXFeTiEHyG0GieYAOe/:fgNPZdzkaFO7WeYgFeGESG01eYAU7Y
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-