General
-
Target
NEAS.6d8873c8ba23b5fca6972375bf9209c0.exe
-
Size
1.1MB
-
Sample
231107-d4blzsag9y
-
MD5
6d8873c8ba23b5fca6972375bf9209c0
-
SHA1
9fb4e593cee2cb3aa051f6dfcea2495318c71ee6
-
SHA256
202edcaf68d27322eff4469dcbc0a48888fe449d28e6a0aad97b4be8b62fd9d2
-
SHA512
c31cfbd587ed69cec0f5046f94b3ad4e75a4ad767f9d6caf77a81507a500aeb6094788e9b49ef3e082c90aebdb207451b19d2e629222ac0f4f12445c0bc195b1
-
SSDEEP
12288:0l+4Tcyct/JWT7yckBlepmbMsBXYHOWyAh5+djVyKDGpiRe7FaS+ug82qGeJ3btU:pyc5JWackYm7dZ1Oq2nn2qPJ3btV3+f
Behavioral task
behavioral1
Sample
NEAS.6d8873c8ba23b5fca6972375bf9209c0.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.6d8873c8ba23b5fca6972375bf9209c0.exe
Resource
win10v2004-20231025-en
Malware Config
Targets
-
-
Target
NEAS.6d8873c8ba23b5fca6972375bf9209c0.exe
-
Size
1.1MB
-
MD5
6d8873c8ba23b5fca6972375bf9209c0
-
SHA1
9fb4e593cee2cb3aa051f6dfcea2495318c71ee6
-
SHA256
202edcaf68d27322eff4469dcbc0a48888fe449d28e6a0aad97b4be8b62fd9d2
-
SHA512
c31cfbd587ed69cec0f5046f94b3ad4e75a4ad767f9d6caf77a81507a500aeb6094788e9b49ef3e082c90aebdb207451b19d2e629222ac0f4f12445c0bc195b1
-
SSDEEP
12288:0l+4Tcyct/JWT7yckBlepmbMsBXYHOWyAh5+djVyKDGpiRe7FaS+ug82qGeJ3btU:pyc5JWackYm7dZ1Oq2nn2qPJ3btV3+f
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1