General
-
Target
NEAS.fad61576119f9f0e83a0f04704bab2f0.exe
-
Size
1.4MB
-
Sample
231103-l9qxvsga7x
-
MD5
fad61576119f9f0e83a0f04704bab2f0
-
SHA1
6bef3b913813986048e85850d7dd7e8c1bc7985b
-
SHA256
a1db60576f72eb77c785e3af0d8df11f4f845606c7f33b69b2f385e2c26167f8
-
SHA512
baa5d6a0edba5ed6f794bb8d9d9a1b036231f367a7d69ea5710d6f079b599017f867296c065184a28bf1c0a1e0899c723f1c8b8379d5478a82b9e1a83ca4b263
-
SSDEEP
24576:qBBkOlRe8ZcXPuCyRdaN1yV/vELneAcCg8:uOOy8eEa1Jct8
Behavioral task
behavioral1
Sample
NEAS.fad61576119f9f0e83a0f04704bab2f0.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.fad61576119f9f0e83a0f04704bab2f0.exe
Resource
win10v2004-20231020-en
Malware Config
Targets
-
-
Target
NEAS.fad61576119f9f0e83a0f04704bab2f0.exe
-
Size
1.4MB
-
MD5
fad61576119f9f0e83a0f04704bab2f0
-
SHA1
6bef3b913813986048e85850d7dd7e8c1bc7985b
-
SHA256
a1db60576f72eb77c785e3af0d8df11f4f845606c7f33b69b2f385e2c26167f8
-
SHA512
baa5d6a0edba5ed6f794bb8d9d9a1b036231f367a7d69ea5710d6f079b599017f867296c065184a28bf1c0a1e0899c723f1c8b8379d5478a82b9e1a83ca4b263
-
SSDEEP
24576:qBBkOlRe8ZcXPuCyRdaN1yV/vELneAcCg8:uOOy8eEa1Jct8
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1