General
-
Target
DoxoGram.exe
-
Size
164.7MB
-
Sample
250205-trbdfstpdz
-
MD5
c3a81a9e5fafbb1c0d52befb0d4d5f70
-
SHA1
a22703fb5ea58a669189be756bea90b875b189e5
-
SHA256
b2745f51ed35c1ecef03c466af5872c79a50cbf57f1b398c7c368f70c48dceac
-
SHA512
96a78469b9730116cb5dc9e9ea9703d080e90a817da56fd557ad63faa59c54e74c683afa4dd32fa61cd504aa44616b5c3b9ea9151fc2eec589e5cc3cbfa9b525
-
SSDEEP
24576:zTbBv5rUdzf3fDhPCGgZrYLolvaongbHIBnS9JoLUIMxjqkUztx0/ceaEj1PtM:tBK/8aEgbQS9JoLUrxWlZx3ej
Static task
static1
Behavioral task
behavioral1
Sample
DoxoGram.exe
Resource
win10v2004-20250129-en
Malware Config
Targets
-
-
Target
DoxoGram.exe
-
Size
164.7MB
-
MD5
c3a81a9e5fafbb1c0d52befb0d4d5f70
-
SHA1
a22703fb5ea58a669189be756bea90b875b189e5
-
SHA256
b2745f51ed35c1ecef03c466af5872c79a50cbf57f1b398c7c368f70c48dceac
-
SHA512
96a78469b9730116cb5dc9e9ea9703d080e90a817da56fd557ad63faa59c54e74c683afa4dd32fa61cd504aa44616b5c3b9ea9151fc2eec589e5cc3cbfa9b525
-
SSDEEP
24576:zTbBv5rUdzf3fDhPCGgZrYLolvaongbHIBnS9JoLUIMxjqkUztx0/ceaEj1PtM:tBK/8aEgbQS9JoLUrxWlZx3ej
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-