General
-
Target
c25f075beb4681df3df52d716babd7d1570f15f433e9b55880102ecc6a70de67N.exe
-
Size
827KB
-
Sample
250202-d3vy8stlas
-
MD5
b75ce2dd6d4635f56d18407c6dd6a3e0
-
SHA1
42360f11f12bbfb0c7f8ce1f793d463f4b3b49f5
-
SHA256
c25f075beb4681df3df52d716babd7d1570f15f433e9b55880102ecc6a70de67
-
SHA512
bdd693058101ed735339ab4b71d643fb4b8bb6a21c2f0b365fc13228a01f2d10a7a0fbe85dd6ebbf10f31dd5a5052fc2c7df83b659ad73128e55058dc635fa16
-
SSDEEP
12288:+PjbkdQsEdvdRDnB0WmNN3D+nvIsmnxkmt7IxcC1A:+rbQQsE9WWmNNz+wpxlyxcMA
Behavioral task
behavioral1
Sample
c25f075beb4681df3df52d716babd7d1570f15f433e9b55880102ecc6a70de67N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c25f075beb4681df3df52d716babd7d1570f15f433e9b55880102ecc6a70de67N.exe
Resource
win10v2004-20250129-en
Malware Config
Targets
-
-
Target
c25f075beb4681df3df52d716babd7d1570f15f433e9b55880102ecc6a70de67N.exe
-
Size
827KB
-
MD5
b75ce2dd6d4635f56d18407c6dd6a3e0
-
SHA1
42360f11f12bbfb0c7f8ce1f793d463f4b3b49f5
-
SHA256
c25f075beb4681df3df52d716babd7d1570f15f433e9b55880102ecc6a70de67
-
SHA512
bdd693058101ed735339ab4b71d643fb4b8bb6a21c2f0b365fc13228a01f2d10a7a0fbe85dd6ebbf10f31dd5a5052fc2c7df83b659ad73128e55058dc635fa16
-
SSDEEP
12288:+PjbkdQsEdvdRDnB0WmNN3D+nvIsmnxkmt7IxcC1A:+rbQQsE9WWmNNz+wpxlyxcMA
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-