General
-
Target
386bd2b2a1d1899d13aad65caeee2270a062d4aba942420b4c6f3772f98330b6
-
Size
1.1MB
-
Sample
250207-1r37ss1kfr
-
MD5
b1aef8e00d2f8831202653cdfe252500
-
SHA1
06355ce7ff6d4703687e6bbc42453ab54ead44a4
-
SHA256
386bd2b2a1d1899d13aad65caeee2270a062d4aba942420b4c6f3772f98330b6
-
SHA512
66deed8db457ae1804c9b04b6009fffc15aa7d68f2aed8fec2e027f238e363b3dd7782096c2f512136a7cbf94e30f675621f62fd5fb6b4af72267b4efc9b4f76
-
SSDEEP
24576:lR1EqyxFq++j7VH84qrBPMKg4hBBmPdBYgmZ:pE/WD4hBkPd2
Behavioral task
behavioral1
Sample
386bd2b2a1d1899d13aad65caeee2270a062d4aba942420b4c6f3772f98330b6.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
386bd2b2a1d1899d13aad65caeee2270a062d4aba942420b4c6f3772f98330b6.exe
Resource
win10v2004-20250207-en
Malware Config
Targets
-
-
Target
386bd2b2a1d1899d13aad65caeee2270a062d4aba942420b4c6f3772f98330b6
-
Size
1.1MB
-
MD5
b1aef8e00d2f8831202653cdfe252500
-
SHA1
06355ce7ff6d4703687e6bbc42453ab54ead44a4
-
SHA256
386bd2b2a1d1899d13aad65caeee2270a062d4aba942420b4c6f3772f98330b6
-
SHA512
66deed8db457ae1804c9b04b6009fffc15aa7d68f2aed8fec2e027f238e363b3dd7782096c2f512136a7cbf94e30f675621f62fd5fb6b4af72267b4efc9b4f76
-
SSDEEP
24576:lR1EqyxFq++j7VH84qrBPMKg4hBBmPdBYgmZ:pE/WD4hBkPd2
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-