General
-
Target
7ea678de785f972f7926d0f68aad806e.exe
-
Size
1.3MB
-
Sample
250208-aaf3tswjbn
-
MD5
7ea678de785f972f7926d0f68aad806e
-
SHA1
e63c44f6290aaa1ed5b4e18c2133a7f293b7a542
-
SHA256
4f5ef165360a12e56bfe95fe07796f3dfc5e10f38445b561caf18eff39cb2ec6
-
SHA512
7749fd7270a331caf38e39573ea8af0d9efd76982b0a3b536dff3d0dff12f54999f2cfcfbc63e41374d2d45b4e881804c6f1f3ec46320bad261af99f076fbef4
-
SSDEEP
24576:P2G/nvxW3WV0HIi8HKQcbJlgYFH4Is8cNVFEFmtbqle+1aFMXy:PbA3DHIi8kSDN7+TC
Behavioral task
behavioral1
Sample
7ea678de785f972f7926d0f68aad806e.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
7ea678de785f972f7926d0f68aad806e.exe
Resource
win10v2004-20250207-en
Malware Config
Targets
-
-
Target
7ea678de785f972f7926d0f68aad806e.exe
-
Size
1.3MB
-
MD5
7ea678de785f972f7926d0f68aad806e
-
SHA1
e63c44f6290aaa1ed5b4e18c2133a7f293b7a542
-
SHA256
4f5ef165360a12e56bfe95fe07796f3dfc5e10f38445b561caf18eff39cb2ec6
-
SHA512
7749fd7270a331caf38e39573ea8af0d9efd76982b0a3b536dff3d0dff12f54999f2cfcfbc63e41374d2d45b4e881804c6f1f3ec46320bad261af99f076fbef4
-
SSDEEP
24576:P2G/nvxW3WV0HIi8HKQcbJlgYFH4Is8cNVFEFmtbqle+1aFMXy:PbA3DHIi8kSDN7+TC
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-