General
-
Target
nedohackers4.exe
-
Size
1.1MB
-
Sample
250201-swfy3azngk
-
MD5
215c2ae4474bfc4ed0413f18306d9166
-
SHA1
eeef87c29c4190d2e9bce74026e8753cd5dd3a8a
-
SHA256
2c2f3eb6ca985e2116305370b66916156737ce3371e61fc4db0048ca325be5a1
-
SHA512
8e9185118c885e641221e5463188c2945819da2e54c4dc15cecc3fdb7dead163f9ea82362d9d00f1e6d88f5ae6d2f5b672134373f95e371eb2607da22ab5f6d0
-
SSDEEP
24576:U2G/nvxW3Ww0tgpur/hbcITVYFMMjFiJmUixpO6:UbA30k0hb3Y36U06
Behavioral task
behavioral1
Sample
nedohackers4.exe
Resource
win10ltsc2021-20250128-en
Malware Config
Targets
-
-
Target
nedohackers4.exe
-
Size
1.1MB
-
MD5
215c2ae4474bfc4ed0413f18306d9166
-
SHA1
eeef87c29c4190d2e9bce74026e8753cd5dd3a8a
-
SHA256
2c2f3eb6ca985e2116305370b66916156737ce3371e61fc4db0048ca325be5a1
-
SHA512
8e9185118c885e641221e5463188c2945819da2e54c4dc15cecc3fdb7dead163f9ea82362d9d00f1e6d88f5ae6d2f5b672134373f95e371eb2607da22ab5f6d0
-
SSDEEP
24576:U2G/nvxW3Ww0tgpur/hbcITVYFMMjFiJmUixpO6:UbA30k0hb3Y36U06
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-