File name: | rl_483c771e510e467ad2bf37f131bab5b9523ebec204434036216eaf324cb5ece2 |
Full analysis: | https://app.any.run/tasks/1737a91f-64b1-4780-b23d-b5db429c95d4 |
Verdict: | Malicious activity |
Threats: | DCrat, also known as Dark Crystal RAT, is a remote access trojan (RAT), which was first introduced in 2018. It is a modular malware that can be customized to perform different tasks. For instance, it can steal passwords, crypto wallet information, hijack Telegram and Steam accounts, and more. Attackers may use a variety of methods to distribute DCrat, but phishing email campaigns are the most common. |
Analysis date: | July 06, 2025, 05:36:59 |
OS: | Windows 10 Professional (build: 19044, 64 bit) |
Tags: | |
Indicators: | |
MIME: | application/vnd.microsoft.portable-executable |
File info: | PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections |
MD5: | 75110DD666CC146385EE000125D2AF56 |
SHA1: | 76AD36D5F3CEE14F458E222450A2B9F26AC195E8 |
SHA256: | 483C771E510E467AD2BF37F131BAB5B9523EBEC204434036216EAF324CB5ECE2 |
SSDEEP: | 98304:OkWJwsUacbXnSJQGz5QRErOxhb/2VwQIZMzKUd4sCPhnCvKGoKfxktS9e5HGfPpu:lu9Ru3 |
.exe | | | Generic CIL Executable (.NET, Mono, etc.) (56.7) |
---|---|---|
.exe | | | Win64 Executable (generic) (21.3) |
.scr | | | Windows screen saver (10.1) |
.dll | | | Win32 Dynamic Link Library (generic) (5) |
.exe | | | Win32 Executable (generic) (3.4) |
MachineType: | Intel 386 or later, and compatibles |
---|---|
TimeStamp: | 2025:01:29 15:01:49+00:00 |
ImageFileCharacteristics: | Executable, No line numbers, No symbols, 32-bit |
PEType: | PE32 |
LinkerVersion: | 11 |
CodeSize: | 3642880 |
InitializedDataSize: | 1536 |
UninitializedDataSize: | - |
EntryPoint: | 0x37b4ce |
OSVersion: | 4 |
ImageVersion: | - |
SubsystemVersion: | 4 |
Subsystem: | Windows GUI |
FileVersionNumber: | 1.2.7.1277 |
ProductVersionNumber: | 1.2.7.1277 |
FileFlagsMask: | 0x003f |
FileFlags: | (none) |
FileOS: | Win32 |
ObjectFileType: | Executable application |
FileSubtype: | - |
LanguageCode: | Neutral |
CharacterSet: | Unicode |
CompanyName: | - |
FileDescription: | - |
FileVersion: | 1.2.7.1277 |
InternalName: | SpotifyStartupTask |
LegalCopyright: | Copyright (c) 2023, Spotify Ltd |
OriginalFileName: | SpotifyStartupTask.exe |
ProductName: | - |
ProductVersion: | 1.2.7.1277 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
316 | "C:\Users\admin\Desktop\rl_483c771e510e467ad2bf37f131bab5b9523ebec204434036216eaf324cb5ece2.exe" | C:\Users\admin\Desktop\rl_483c771e510e467ad2bf37f131bab5b9523ebec204434036216eaf324cb5ece2.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Version: 1.2.7.1277 Modules
| |||||||||||||||
592 | chcp 65001 | C:\Windows\System32\chcp.com | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Change CodePage Utility Exit code: 0 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
728 | C:\WINDOWS\system32\cmd.exe /c ""C:\Users\admin\AppData\Local\Temp\T7zpOYzElC.bat" " | C:\Windows\System32\cmd.exe | — | sppsvc.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
984 | "C:\Users\Default\Recent\sppsvc.exe" | C:\Users\Default\AppData\Roaming\Microsoft\Windows\Recent\sppsvc.exe | cmd.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Version: 1.2.7.1277 Modules
| |||||||||||||||
1056 | "C:\Users\Default\Recent\sppsvc.exe" | C:\Users\Default\AppData\Roaming\Microsoft\Windows\Recent\sppsvc.exe | cmd.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Version: 1.2.7.1277 Modules
| |||||||||||||||
1132 | C:\WINDOWS\system32\cmd.exe /c ""C:\Users\admin\AppData\Local\Temp\go28NrNAN1.bat" " | C:\Windows\System32\cmd.exe | — | sppsvc.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
1208 | chcp 65001 | C:\Windows\System32\chcp.com | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Change CodePage Utility Exit code: 0 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
1336 | C:\WINDOWS\system32\cmd.exe /c ""C:\Users\admin\AppData\Local\Temp\6dU9gqbUad.bat" " | C:\Windows\System32\cmd.exe | — | sppsvc.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
1612 | chcp 65001 | C:\Windows\System32\chcp.com | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Change CodePage Utility Exit code: 0 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
1636 | w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2 | C:\Windows\System32\w32tm.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Time Service Diagnostic Tool Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
|
(PID) Process: | (316) rl_483c771e510e467ad2bf37f131bab5b9523ebec204434036216eaf324cb5ece2.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\cede431155c0cacd50e985207d7493f05a8e1ae7 |
Operation: | write | Name: | 268ed7d110b74aa21d684db2452613bbe1298d00 |
Value: H4sIAAAAAAAEAHWPTWsCMRCG/4p4Ftl87K71Jgr2IFS09uIUmSQTCcbN4uyqP79BelNP8/LwzNd+OJ8C7JguDLAgj33sAH6Co5TBl/fB0jwGe/pOm74Z052Go5ctG7LU5Mpty1f7LKI7hyb76dbEhC6TyMj8LM5iHPzH9Wq3BFilY84c+/B26hav5AZLPFNmDvkzcff+BOJTl1qASzzoibJ1LagUBemqRieNV7UXShg0pfkopSJDVhZaK12oSoqK0CuprSnzw/Kx5PcPq2Y6t0UBAAA= | |||
(PID) Process: | (3956) sppsvc.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\sppsvc_RASAPI32 |
Operation: | write | Name: | EnableFileTracing |
Value: 0 | |||
(PID) Process: | (3956) sppsvc.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\sppsvc_RASAPI32 |
Operation: | write | Name: | EnableAutoFileTracing |
Value: 0 | |||
(PID) Process: | (3956) sppsvc.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\sppsvc_RASAPI32 |
Operation: | write | Name: | EnableConsoleTracing |
Value: 0 | |||
(PID) Process: | (3956) sppsvc.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\sppsvc_RASAPI32 |
Operation: | write | Name: | FileTracingMask |
Value: | |||
(PID) Process: | (3956) sppsvc.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\sppsvc_RASAPI32 |
Operation: | write | Name: | ConsoleTracingMask |
Value: | |||
(PID) Process: | (3956) sppsvc.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\sppsvc_RASAPI32 |
Operation: | write | Name: | MaxFileSize |
Value: 1048576 | |||
(PID) Process: | (3956) sppsvc.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\sppsvc_RASAPI32 |
Operation: | write | Name: | FileDirectory |
Value: %windir%\tracing | |||
(PID) Process: | (3956) sppsvc.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\sppsvc_RASMANCS |
Operation: | write | Name: | EnableFileTracing |
Value: 0 | |||
(PID) Process: | (3956) sppsvc.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\sppsvc_RASMANCS |
Operation: | write | Name: | EnableAutoFileTracing |
Value: 0 |
PID | Process | Filename | Type | |
---|---|---|---|---|
316 | rl_483c771e510e467ad2bf37f131bab5b9523ebec204434036216eaf324cb5ece2.exe | C:\Users\admin\Desktop\ldZTrmdb.log | executable | |
MD5:51B1964F31C557AE8C2B01EA164ABD9F | SHA256:AF584F142A9A5A79355B212F8D7A2E3793E33FF23D50FDE591FB2F3E49BF308C | |||
316 | rl_483c771e510e467ad2bf37f131bab5b9523ebec204434036216eaf324cb5ece2.exe | C:\Users\admin\Desktop\vMsjaOjJ.log | executable | |
MD5:E9CE850DB4350471A62CC24ACB83E859 | SHA256:7C95D3B38114E7E4126CB63AADAF80085ED5461AB0868D2365DD6A18C946EA3A | |||
316 | rl_483c771e510e467ad2bf37f131bab5b9523ebec204434036216eaf324cb5ece2.exe | C:\Users\admin\Desktop\wRDKaxYJ.log | executable | |
MD5:D8BF2A0481C0A17A634D066A711C12E9 | SHA256:2B93377EA087225820A9F8E4F331005A0C600D557242366F06E0C1EAE003D669 | |||
316 | rl_483c771e510e467ad2bf37f131bab5b9523ebec204434036216eaf324cb5ece2.exe | C:\Users\admin\Desktop\BnOqpYuv.log | executable | |
MD5:16B480082780CC1D8C23FB05468F64E7 | SHA256:7A080D8BD178EC02C7F39F7F941479074C450C4FDD8E963C993D2FB5537C7708 | |||
316 | rl_483c771e510e467ad2bf37f131bab5b9523ebec204434036216eaf324cb5ece2.exe | C:\Users\admin\Desktop\ZKanAwNB.log | executable | |
MD5:5EE7E079F998F80293B3467CE6A5B4AE | SHA256:A3AE7E97703E694C479E3B460F89C16B4A511626E351145532D1A2F3BA051779 | |||
316 | rl_483c771e510e467ad2bf37f131bab5b9523ebec204434036216eaf324cb5ece2.exe | C:\Users\admin\Desktop\QgRxQCyT.log | executable | |
MD5:3601048DFB8C4A69313A593E74E5A2DE | SHA256:F5F1BA9E344B2F2E9CF90978C6D3518DFB55B316489E360874E3A1144BAC3C05 | |||
316 | rl_483c771e510e467ad2bf37f131bab5b9523ebec204434036216eaf324cb5ece2.exe | C:\Users\admin\Desktop\LfFGJnSZ.log | executable | |
MD5:00574FB20124EAFD40DC945EC86CA59C | SHA256:3A0C38E5DC41A8D668EBDD9368CEE89F4991350E6967A9715CAE8F36E0D032BB | |||
316 | rl_483c771e510e467ad2bf37f131bab5b9523ebec204434036216eaf324cb5ece2.exe | C:\Users\admin\Desktop\WZuXtiDI.log | executable | |
MD5:D478E398EFCD2BD9BDBFEA958F7BEE4F | SHA256:32E821193BE1D81BB3BE97F2719D28A0C7DD2E5BD94DC581D79A1497462EAC9B | |||
316 | rl_483c771e510e467ad2bf37f131bab5b9523ebec204434036216eaf324cb5ece2.exe | C:\Users\admin\Desktop\yUpswgdF.log | executable | |
MD5:6CD78D07F9BD4FECC55CDB392BC5EC89 | SHA256:16CC3B734E72A74F578B63D08D81CC75B6C2445FB631EFD19F8A70D786871AD4 | |||
316 | rl_483c771e510e467ad2bf37f131bab5b9523ebec204434036216eaf324cb5ece2.exe | C:\Users\admin\Desktop\MlQgJWIa.log | executable | |
MD5:0B2AFABFAF0DD55AD21AC76FBF03B8A0 | SHA256:DD4560987BD87EF3E6E8FAE220BA22AA08812E9743352523C846553BD99E4254 |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
3956 | sppsvc.exe | POST | 404 | 5.101.152.71:80 | http://maxsim87.beget.tech/JavascriptrequestSecurewpcdn.php | unknown | — | — | whitelisted |
3720 | SIHClient.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Signing%20CA%202.1.crl | unknown | — | — | whitelisted |
5944 | MoUsoCoreWorker.exe | GET | 200 | 2.20.245.137:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
5944 | MoUsoCoreWorker.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
— | — | GET | 200 | 4.245.163.56:443 | https://slscr.update.microsoft.com/SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.4046/0?CH=686&L=en-US&P=&PT=0x30&WUA=10.0.19041.3996&MK=DELL&MD=DELL | unknown | compressed | 23.9 Kb | whitelisted |
— | — | POST | 400 | 20.190.160.132:443 | https://login.live.com/ppsecure/deviceaddcredential.srf | unknown | text | 203 b | whitelisted |
3720 | SIHClient.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.1.crl | unknown | — | — | whitelisted |
3720 | SIHClient.exe | GET | 200 | 23.216.77.6:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl | unknown | — | — | whitelisted |
— | — | POST | 200 | 40.126.31.128:443 | https://login.live.com/RST2.srf | unknown | xml | 1.24 Kb | whitelisted |
1268 | svchost.exe | GET | 200 | 2.20.245.137:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
5944 | MoUsoCoreWorker.exe | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
2148 | RUXIMICS.exe | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
1268 | svchost.exe | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
1268 | svchost.exe | 2.20.245.137:80 | crl.microsoft.com | Akamai International B.V. | NL | whitelisted |
5944 | MoUsoCoreWorker.exe | 2.20.245.137:80 | crl.microsoft.com | Akamai International B.V. | NL | whitelisted |
1268 | svchost.exe | 95.101.149.131:80 | www.microsoft.com | Akamai International B.V. | NL | whitelisted |
2148 | RUXIMICS.exe | 95.101.149.131:80 | www.microsoft.com | Akamai International B.V. | NL | whitelisted |
5944 | MoUsoCoreWorker.exe | 95.101.149.131:80 | www.microsoft.com | Akamai International B.V. | NL | whitelisted |
Domain | IP | Reputation |
---|---|---|
google.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
settings-win.data.microsoft.com |
| whitelisted |
login.live.com |
| whitelisted |
maxsim87.beget.tech |
| whitelisted |
nexusrules.officeapps.live.com |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |
fe3cr.delivery.mp.microsoft.com |
| whitelisted |
activation-v2.sls.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
---|---|---|---|
— | — | A Network Trojan was detected | ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST) |
— | — | A Network Trojan was detected | REMOTE [ANY.RUN] DarkCrystal Rat Check-in (POST) |
— | — | A Network Trojan was detected | REMOTE [ANY.RUN] DarkCrystal Rat Check-in (POST) |
— | — | A Network Trojan was detected | ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST) |
— | — | A Network Trojan was detected | ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST) |
— | — | A Network Trojan was detected | REMOTE [ANY.RUN] DarkCrystal Rat Check-in (POST) |
— | — | A Network Trojan was detected | REMOTE [ANY.RUN] DarkCrystal Rat Check-in (POST) |
— | — | A Network Trojan was detected | ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST) |
— | — | A Network Trojan was detected | ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST) |
— | — | A Network Trojan was detected | REMOTE [ANY.RUN] DarkCrystal Rat Check-in (POST) |