General
-
Target
383cad8eb4744a1be8c2b17c74b97b0a.exe
-
Size
1.2MB
-
Sample
250129-hw34gstpes
-
MD5
383cad8eb4744a1be8c2b17c74b97b0a
-
SHA1
23ccdd08ba293d56ac66b682b57585a85e1742a1
-
SHA256
fcf5d6647e4d2e13f8083d42fd2f354735453e847d5e5c2f4ae78c78a6b4254b
-
SHA512
713896072fd43a6566c895ff96f47fb13442864004e1977a79632818537fdf42401fe0659b2ffe21cdf30a097c5d1576b8856046629822cede88f5f77c0a275d
-
SSDEEP
24576:MATnwO965z/roRbcJEV2oLI2gDMwifE+O3jV5kF9BrK:XuaKEEgTBr
Behavioral task
behavioral1
Sample
383cad8eb4744a1be8c2b17c74b97b0a.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
383cad8eb4744a1be8c2b17c74b97b0a.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
383cad8eb4744a1be8c2b17c74b97b0a.exe
-
Size
1.2MB
-
MD5
383cad8eb4744a1be8c2b17c74b97b0a
-
SHA1
23ccdd08ba293d56ac66b682b57585a85e1742a1
-
SHA256
fcf5d6647e4d2e13f8083d42fd2f354735453e847d5e5c2f4ae78c78a6b4254b
-
SHA512
713896072fd43a6566c895ff96f47fb13442864004e1977a79632818537fdf42401fe0659b2ffe21cdf30a097c5d1576b8856046629822cede88f5f77c0a275d
-
SSDEEP
24576:MATnwO965z/roRbcJEV2oLI2gDMwifE+O3jV5kF9BrK:XuaKEEgTBr
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-