General
-
Target
DCRatBuild.exe
-
Size
1.4MB
-
Sample
250326-ft3zla1mx7
-
MD5
890b09aea29e89eaf80df95deefb73c3
-
SHA1
3c6b2b2e635542eaaf4aefd3e0af6a285aefab50
-
SHA256
225e120cff3c4735693f6297f074cc50a7eb21709668ac7b283514a497296478
-
SHA512
2a8388fda1533b06d377ed46457cf2f68919ac62cd0ef6ff79a88383a60c1ca0b27a7dc6b1fdcde09f5a7f5b5b7389f27a2f4e79c7c5d2f01f0c602f3cec5421
-
SSDEEP
24576:9TbBv5rUCB0nQ1c9yzgS5o/mNHJK7CXiUgRRAJtndHr5k+jp9TO7:XBOQ1Iy0MYRIfj+
Static task
static1
Behavioral task
behavioral1
Sample
DCRatBuild.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
DCRatBuild.exe
Resource
win10v2004-20250314-en
Malware Config
Targets
-
-
Target
DCRatBuild.exe
-
Size
1.4MB
-
MD5
890b09aea29e89eaf80df95deefb73c3
-
SHA1
3c6b2b2e635542eaaf4aefd3e0af6a285aefab50
-
SHA256
225e120cff3c4735693f6297f074cc50a7eb21709668ac7b283514a497296478
-
SHA512
2a8388fda1533b06d377ed46457cf2f68919ac62cd0ef6ff79a88383a60c1ca0b27a7dc6b1fdcde09f5a7f5b5b7389f27a2f4e79c7c5d2f01f0c602f3cec5421
-
SSDEEP
24576:9TbBv5rUCB0nQ1c9yzgS5o/mNHJK7CXiUgRRAJtndHr5k+jp9TO7:XBOQ1Iy0MYRIfj+
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
.NET Reactor proctector
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-