General
-
Target
55d398dd395a13c92b854cb5f51d26fe3879e6b5b2d2d6f4b98324dd3be7326cexe_JC.exe
-
Size
10.2MB
-
Sample
230803-w588ragg5x
-
MD5
05884e8e41f9bd5c319c6fb98aa6124f
-
SHA1
6483fd4518dc4e41face7058253e0a5e26ee80c5
-
SHA256
55d398dd395a13c92b854cb5f51d26fe3879e6b5b2d2d6f4b98324dd3be7326c
-
SHA512
1d7e27e862dcef2e3efa37d313063419d45b7a342b5c7127738264005eae3c74842452029027bf78e38f93142e185dc9e3ad416f127f30748269621230225875
-
SSDEEP
196608:B1LiNA4XPhK/boHDlJCncnCSGF+CVIxlRpIO2A0O1gIXLEOoEPFKC:vLi+8pKDmIncDG0CVIxlRpIO57EDEP4C
Behavioral task
behavioral1
Sample
55d398dd395a13c92b854cb5f51d26fe3879e6b5b2d2d6f4b98324dd3be7326cexe_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
55d398dd395a13c92b854cb5f51d26fe3879e6b5b2d2d6f4b98324dd3be7326cexe_JC.exe
Resource
win10v2004-20230703-en
Malware Config
Targets
-
-
Target
55d398dd395a13c92b854cb5f51d26fe3879e6b5b2d2d6f4b98324dd3be7326cexe_JC.exe
-
Size
10.2MB
-
MD5
05884e8e41f9bd5c319c6fb98aa6124f
-
SHA1
6483fd4518dc4e41face7058253e0a5e26ee80c5
-
SHA256
55d398dd395a13c92b854cb5f51d26fe3879e6b5b2d2d6f4b98324dd3be7326c
-
SHA512
1d7e27e862dcef2e3efa37d313063419d45b7a342b5c7127738264005eae3c74842452029027bf78e38f93142e185dc9e3ad416f127f30748269621230225875
-
SSDEEP
196608:B1LiNA4XPhK/boHDlJCncnCSGF+CVIxlRpIO2A0O1gIXLEOoEPFKC:vLi+8pKDmIncDG0CVIxlRpIO57EDEP4C
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Modifies WinLogon for persistence
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1