General
-
Target
a2bf0fc5a323073723c337d9a90e5141bd2ff9ad0b3f70459ee695962f87f8e6.zip
-
Size
415KB
-
Sample
250207-lvhypsxja1
-
MD5
ac710165e91fc2593b389369855bd983
-
SHA1
f56cef636ff1a810241cc63c46c709309bf73074
-
SHA256
0e9dcb9b0b8faea9bede2025874aebd0fe9edbbe8296ce6fde1acd6507f28f96
-
SHA512
b61ff79d9bccdaec4c0e9e1e60be5cc4b808a20dcc9dee893979e0d53fcf34920d2a42e276908fe8d3ab1430d399cff59659dc7e9577c9e0850cd513cddbe6e6
-
SSDEEP
12288:ahJdm4VjWi9u0sikDTexaSAFsMjag4ff2Llm:Eiyyi9JsikD6gSAqMjD4ff2Bm
Behavioral task
behavioral1
Sample
a2bf0fc5a323073723c337d9a90e5141bd2ff9ad0b3f70459ee695962f87f8e6.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
a2bf0fc5a323073723c337d9a90e5141bd2ff9ad0b3f70459ee695962f87f8e6.exe
Resource
win10v2004-20250129-en
Malware Config
Targets
-
-
Target
a2bf0fc5a323073723c337d9a90e5141bd2ff9ad0b3f70459ee695962f87f8e6.exe
-
Size
827KB
-
MD5
23d0dbe545edf5e3f6d5f89306091acb
-
SHA1
d2aa733c6e5bcfd64030c810014c09e52eb64474
-
SHA256
a2bf0fc5a323073723c337d9a90e5141bd2ff9ad0b3f70459ee695962f87f8e6
-
SHA512
65e3f360ccf29130b709ca6ba06f7809578bd860e7bc12da1631467899db017feeaf92fa804c797ccbcaa96c97ed7911a1e7021a8c5df84779e66caa8bf8f69a
-
SSDEEP
12288:THO6O1v7cpNWrqV908Etd+U4UCrw3EO9VENXJMV5SEZd0ju:b0v7cpXVe8EtwUtD3ET6SEZR
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-