General
-
Target
fed24fca9235528a9e0a686ff60b723d.exe
-
Size
1.2MB
-
Sample
250202-l44lrswrgw
-
MD5
fed24fca9235528a9e0a686ff60b723d
-
SHA1
e497808ca573e7dfd2e4d99d2c085ab9724707e0
-
SHA256
52fd5f4ce18c0d8ee4fce41364371d39bf024d3be241cc4f765a6c73cff1d288
-
SHA512
2c1699f394a6c8708cd13f53e7df631b7548d72bb46b035963044c1f6c73b84ebba1e1adc02fe5f22d2aae31470bc9e61cce623cbdee3682c54b387befb7b999
-
SSDEEP
12288:90b329aw7HMGuBrwRCRa+XplQBuK7hEefjf05gRyC7Z3M6xqPhbqOEJv005vnhJb:98yaw7HMHXRa+y7htfxRr2EgKt0O8C3
Behavioral task
behavioral1
Sample
fed24fca9235528a9e0a686ff60b723d.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fed24fca9235528a9e0a686ff60b723d.exe
Resource
win10v2004-20250129-en
Malware Config
Targets
-
-
Target
fed24fca9235528a9e0a686ff60b723d.exe
-
Size
1.2MB
-
MD5
fed24fca9235528a9e0a686ff60b723d
-
SHA1
e497808ca573e7dfd2e4d99d2c085ab9724707e0
-
SHA256
52fd5f4ce18c0d8ee4fce41364371d39bf024d3be241cc4f765a6c73cff1d288
-
SHA512
2c1699f394a6c8708cd13f53e7df631b7548d72bb46b035963044c1f6c73b84ebba1e1adc02fe5f22d2aae31470bc9e61cce623cbdee3682c54b387befb7b999
-
SSDEEP
12288:90b329aw7HMGuBrwRCRa+XplQBuK7hEefjf05gRyC7Z3M6xqPhbqOEJv005vnhJb:98yaw7HMHXRa+y7htfxRr2EgKt0O8C3
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-