General
-
Target
2025-05-20_eafd537e09d19051f38e8431e903a01c_amadey_black-basta_cova_cryptbot_dcrat_elex_luca-stealer
-
Size
2.1MB
-
Sample
250520-flnvpsvjw8
-
MD5
eafd537e09d19051f38e8431e903a01c
-
SHA1
d72df0774070e1e9986da629dd9f9a90235fb8e0
-
SHA256
edd33db8fca2389a9bbaa05c29034ff30eafec51134e357db3ad9bdf0c71700e
-
SHA512
b85b8b48129f2c9fe06828d02513fef4164f404ac87cbd106cbcb0ecc0a4e0de7e3b5e1d112e027a07cddc693edb56a8d0bb394d327edf68bbbf60a60afdb573
-
SSDEEP
49152:IBJYME2fPRE+fohPTbryP5sKGdxF8614Cymdt5:ySM9P++wpH45nGLF8614UP5
Static task
static1
Behavioral task
behavioral1
Sample
2025-05-20_eafd537e09d19051f38e8431e903a01c_amadey_black-basta_cova_cryptbot_dcrat_elex_luca-stealer.exe
Resource
win10v2004-20250502-en
Behavioral task
behavioral2
Sample
2025-05-20_eafd537e09d19051f38e8431e903a01c_amadey_black-basta_cova_cryptbot_dcrat_elex_luca-stealer.exe
Resource
win11-20250502-en
Malware Config
Targets
-
-
Target
2025-05-20_eafd537e09d19051f38e8431e903a01c_amadey_black-basta_cova_cryptbot_dcrat_elex_luca-stealer
-
Size
2.1MB
-
MD5
eafd537e09d19051f38e8431e903a01c
-
SHA1
d72df0774070e1e9986da629dd9f9a90235fb8e0
-
SHA256
edd33db8fca2389a9bbaa05c29034ff30eafec51134e357db3ad9bdf0c71700e
-
SHA512
b85b8b48129f2c9fe06828d02513fef4164f404ac87cbd106cbcb0ecc0a4e0de7e3b5e1d112e027a07cddc693edb56a8d0bb394d327edf68bbbf60a60afdb573
-
SSDEEP
49152:IBJYME2fPRE+fohPTbryP5sKGdxF8614Cymdt5:ySM9P++wpH45nGLF8614UP5
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-