General
-
Target
0842c1cd11517bdde54e9143f4a1dc9c4a1ac387ae96f972f65d5b49337648cc.exe
-
Size
1.9MB
-
Sample
240212-dtpqvscb5w
-
MD5
03fd9c7c9d838f3e7d4a2e42c317b6be
-
SHA1
66976024383f4557cd20089d9621c63cbe69ef1f
-
SHA256
0842c1cd11517bdde54e9143f4a1dc9c4a1ac387ae96f972f65d5b49337648cc
-
SHA512
177a7f955a5060e96279262cf2fc6a34a59535c93412b1afc8f6c51c7adad1548906d25413f6b43e944154816aba98964da203f42f71192c2ef8eaaac6c40654
-
SSDEEP
49152:tbA3D8ThjyY3Bh5m7Uqbs3Ed/v1/hTTBxjkndCV/WY:tbpThjyY3soqbsUX1/t3jknYV/F
Behavioral task
behavioral1
Sample
0842c1cd11517bdde54e9143f4a1dc9c4a1ac387ae96f972f65d5b49337648cc.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0842c1cd11517bdde54e9143f4a1dc9c4a1ac387ae96f972f65d5b49337648cc.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
0842c1cd11517bdde54e9143f4a1dc9c4a1ac387ae96f972f65d5b49337648cc.exe
-
Size
1.9MB
-
MD5
03fd9c7c9d838f3e7d4a2e42c317b6be
-
SHA1
66976024383f4557cd20089d9621c63cbe69ef1f
-
SHA256
0842c1cd11517bdde54e9143f4a1dc9c4a1ac387ae96f972f65d5b49337648cc
-
SHA512
177a7f955a5060e96279262cf2fc6a34a59535c93412b1afc8f6c51c7adad1548906d25413f6b43e944154816aba98964da203f42f71192c2ef8eaaac6c40654
-
SSDEEP
49152:tbA3D8ThjyY3Bh5m7Uqbs3Ed/v1/hTTBxjkndCV/WY:tbpThjyY3soqbsUX1/t3jknYV/F
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Modifies WinLogon for persistence
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1