General
-
Target
8fa48ae55b5ba85e84d086d7e94a87095d20582e091eaf96ebe7cf906216510b.exe
-
Size
1.2MB
-
Sample
250202-gpftyazram
-
MD5
ed2798838993e4cbcbf8115cdbbc31fa
-
SHA1
b013a3df59ec1a6407c7d290798ddd370cb6a645
-
SHA256
8fa48ae55b5ba85e84d086d7e94a87095d20582e091eaf96ebe7cf906216510b
-
SHA512
4020e60ff02fb5f2beacf7d7c595cd3927a6b6c2f9f57181bc565a59f8a4b4f457db5287aa8b32cffbb2da0f6d4a1d7fe1dec443c28e370189f4f5bf0d4b3fae
-
SSDEEP
24576:O2G/nvxW3WY3h0KomE5c7JtTE/TWsO8Mxz:ObA3x3GKCuP3AM5
Behavioral task
behavioral1
Sample
8fa48ae55b5ba85e84d086d7e94a87095d20582e091eaf96ebe7cf906216510b.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8fa48ae55b5ba85e84d086d7e94a87095d20582e091eaf96ebe7cf906216510b.exe
Resource
win10v2004-20250129-en
Malware Config
Targets
-
-
Target
8fa48ae55b5ba85e84d086d7e94a87095d20582e091eaf96ebe7cf906216510b.exe
-
Size
1.2MB
-
MD5
ed2798838993e4cbcbf8115cdbbc31fa
-
SHA1
b013a3df59ec1a6407c7d290798ddd370cb6a645
-
SHA256
8fa48ae55b5ba85e84d086d7e94a87095d20582e091eaf96ebe7cf906216510b
-
SHA512
4020e60ff02fb5f2beacf7d7c595cd3927a6b6c2f9f57181bc565a59f8a4b4f457db5287aa8b32cffbb2da0f6d4a1d7fe1dec443c28e370189f4f5bf0d4b3fae
-
SSDEEP
24576:O2G/nvxW3WY3h0KomE5c7JtTE/TWsO8Mxz:ObA3x3GKCuP3AM5
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-