General
-
Target
23d0dbe545edf5e3f6d5f89306091acb.exe
-
Size
827KB
-
Sample
250207-ldrvaaxqdj
-
MD5
23d0dbe545edf5e3f6d5f89306091acb
-
SHA1
d2aa733c6e5bcfd64030c810014c09e52eb64474
-
SHA256
a2bf0fc5a323073723c337d9a90e5141bd2ff9ad0b3f70459ee695962f87f8e6
-
SHA512
65e3f360ccf29130b709ca6ba06f7809578bd860e7bc12da1631467899db017feeaf92fa804c797ccbcaa96c97ed7911a1e7021a8c5df84779e66caa8bf8f69a
-
SSDEEP
12288:THO6O1v7cpNWrqV908Etd+U4UCrw3EO9VENXJMV5SEZd0ju:b0v7cpXVe8EtwUtD3ET6SEZR
Behavioral task
behavioral1
Sample
23d0dbe545edf5e3f6d5f89306091acb.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
23d0dbe545edf5e3f6d5f89306091acb.exe
Resource
win10v2004-20250129-en
Malware Config
Targets
-
-
Target
23d0dbe545edf5e3f6d5f89306091acb.exe
-
Size
827KB
-
MD5
23d0dbe545edf5e3f6d5f89306091acb
-
SHA1
d2aa733c6e5bcfd64030c810014c09e52eb64474
-
SHA256
a2bf0fc5a323073723c337d9a90e5141bd2ff9ad0b3f70459ee695962f87f8e6
-
SHA512
65e3f360ccf29130b709ca6ba06f7809578bd860e7bc12da1631467899db017feeaf92fa804c797ccbcaa96c97ed7911a1e7021a8c5df84779e66caa8bf8f69a
-
SSDEEP
12288:THO6O1v7cpNWrqV908Etd+U4UCrw3EO9VENXJMV5SEZd0ju:b0v7cpXVe8EtwUtD3ET6SEZR
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-