General
-
Target
NEAS.66c158147321a1ee377aaca871f67c10.exe
-
Size
783KB
-
Sample
231013-y7y7nscd96
-
MD5
66c158147321a1ee377aaca871f67c10
-
SHA1
e7d81492b40cf90d611538d4e9982919873ddb58
-
SHA256
bf35292b701b24b6a18aa29f6dd6c651d8a50b24098440fc90b8423ca732ee06
-
SHA512
23fd4833c37bc4d7fa2e5b58966431ab826540f7d1f2aa4f8a148fda666f5d1cf9624c6821528ab203012bf52cf77b1cd0c2de89bf2c8d2f0ef4ad64dbd351f4
-
SSDEEP
12288:GqnOYxdAgpoNeF91rg5iFdr0yQ9gYx+EIpakCYJRU7Q9bWoFzqK:G+OQbpbgsFdAyQvzSqaq8q
Behavioral task
behavioral1
Sample
NEAS.66c158147321a1ee377aaca871f67c10.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.66c158147321a1ee377aaca871f67c10.exe
Resource
win10v2004-20230915-en
Malware Config
Targets
-
-
Target
NEAS.66c158147321a1ee377aaca871f67c10.exe
-
Size
783KB
-
MD5
66c158147321a1ee377aaca871f67c10
-
SHA1
e7d81492b40cf90d611538d4e9982919873ddb58
-
SHA256
bf35292b701b24b6a18aa29f6dd6c651d8a50b24098440fc90b8423ca732ee06
-
SHA512
23fd4833c37bc4d7fa2e5b58966431ab826540f7d1f2aa4f8a148fda666f5d1cf9624c6821528ab203012bf52cf77b1cd0c2de89bf2c8d2f0ef4ad64dbd351f4
-
SSDEEP
12288:GqnOYxdAgpoNeF91rg5iFdr0yQ9gYx+EIpakCYJRU7Q9bWoFzqK:G+OQbpbgsFdAyQvzSqaq8q
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1