General
-
Target
0d32ff3680a716fd66cb9ab0e3ebc763.exe
-
Size
2.5MB
-
Sample
220805-s4rerseeb7
-
MD5
0d32ff3680a716fd66cb9ab0e3ebc763
-
SHA1
2aa356f14a156bf56efc66e39e0654bddb4fd95a
-
SHA256
21719369d4b1474ad31c61c60ec7510ab511a21ba5659cca266f1e6a933cdc71
-
SHA512
4b8943fa3058e48c1d27aab2b6a8afb0493ca7a7e0bffccebe6a709a19cb467a8ea89c5673912c05bf4dac3f0d942d097be6c39bf658c5e9b14053ff505c775b
Behavioral task
behavioral1
Sample
0d32ff3680a716fd66cb9ab0e3ebc763.exe
Resource
win7-20220718-en
Malware Config
Targets
-
-
Target
0d32ff3680a716fd66cb9ab0e3ebc763.exe
-
Size
2.5MB
-
MD5
0d32ff3680a716fd66cb9ab0e3ebc763
-
SHA1
2aa356f14a156bf56efc66e39e0654bddb4fd95a
-
SHA256
21719369d4b1474ad31c61c60ec7510ab511a21ba5659cca266f1e6a933cdc71
-
SHA512
4b8943fa3058e48c1d27aab2b6a8afb0493ca7a7e0bffccebe6a709a19cb467a8ea89c5673912c05bf4dac3f0d942d097be6c39bf658c5e9b14053ff505c775b
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-