General
-
Target
AVX.exe
-
Size
15.5MB
-
Sample
250201-pvn2havjfm
-
MD5
71bd1549343b45aaa834d5080b9ffa16
-
SHA1
1b6b8fdf46eb77985871783693293f2d82f3cb18
-
SHA256
38b5e6da055c6acce5b291cb52cca7a36678b8653d27e8cddda58b0bbdb3c13b
-
SHA512
121eb8313a600014c12cb77035dd0be31dc94affa4c398fb58d83fa6025da52e4fc8f9160e6df4c2cfc81ccc71b15f8ca8d5235072e979b70d95fba90643d99e
-
SSDEEP
49152:IBJWHaVVpc2dK3NmRu8X+6C4SqQ1rD+5/aaRBTCUqengzgFeKaHt0:yIT2doN2u8zC4Sv1rY/d/Fqengzg1aN0
Static task
static1
Behavioral task
behavioral1
Sample
AVX.exe
Resource
win10v2004-20250129-en
Malware Config
Targets
-
-
Target
AVX.exe
-
Size
15.5MB
-
MD5
71bd1549343b45aaa834d5080b9ffa16
-
SHA1
1b6b8fdf46eb77985871783693293f2d82f3cb18
-
SHA256
38b5e6da055c6acce5b291cb52cca7a36678b8653d27e8cddda58b0bbdb3c13b
-
SHA512
121eb8313a600014c12cb77035dd0be31dc94affa4c398fb58d83fa6025da52e4fc8f9160e6df4c2cfc81ccc71b15f8ca8d5235072e979b70d95fba90643d99e
-
SSDEEP
49152:IBJWHaVVpc2dK3NmRu8X+6C4SqQ1rD+5/aaRBTCUqengzgFeKaHt0:yIT2doN2u8zC4Sv1rY/d/Fqengzg1aN0
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-