General
-
Target
bad9b63870daa9d4976129b7ac5fabc721d7950017e2151035b4c7747a6ed09a
-
Size
1.7MB
-
Sample
220819-xcwmmahbbn
-
MD5
226328c111a2cccf9a4a2d576ab9a5e9
-
SHA1
7fd7b703a12b44932872d7f5bc420b3cfa0c8b1d
-
SHA256
bad9b63870daa9d4976129b7ac5fabc721d7950017e2151035b4c7747a6ed09a
-
SHA512
39a03007b7f06f74ad1b00626028acaa53aa2740f2a20b87ef37aaff5e95588a2bb26762756747a83a628b6790ff1ff155bfb53b32e802e90bfcf404c4766155
-
SSDEEP
24576:DJpBm3bRcquX2rVqygIOsdV1ytApVLXPtmnwlcYOaf5eznYYF9MCFFRXPLeb:DJyLRqsnV1ytAjzPYzG5ejYI+MXq
Behavioral task
behavioral1
Sample
bad9b63870daa9d4976129b7ac5fabc721d7950017e2151035b4c7747a6ed09a.exe
Resource
win10-20220812-en
Malware Config
Targets
-
-
Target
bad9b63870daa9d4976129b7ac5fabc721d7950017e2151035b4c7747a6ed09a
-
Size
1.7MB
-
MD5
226328c111a2cccf9a4a2d576ab9a5e9
-
SHA1
7fd7b703a12b44932872d7f5bc420b3cfa0c8b1d
-
SHA256
bad9b63870daa9d4976129b7ac5fabc721d7950017e2151035b4c7747a6ed09a
-
SHA512
39a03007b7f06f74ad1b00626028acaa53aa2740f2a20b87ef37aaff5e95588a2bb26762756747a83a628b6790ff1ff155bfb53b32e802e90bfcf404c4766155
-
SSDEEP
24576:DJpBm3bRcquX2rVqygIOsdV1ytApVLXPtmnwlcYOaf5eznYYF9MCFFRXPLeb:DJyLRqsnV1ytAjzPYzG5ejYI+MXq
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Modifies WinLogon for persistence
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Possible privilege escalation attempt
-
Stops running service(s)
-
Modifies file permissions
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v6
Persistence
Modify Existing Service
1Registry Run Keys / Startup Folder
1Scheduled Task
1Winlogon Helper DLL
1