General
-
Target
b018f5a66001f1ccb3553465778d7a65d04d7a0925ac925b692bfbedcbc08295.exe
-
Size
1.8MB
-
Sample
240219-g2hjasah56
-
MD5
2654cf7f87e8aa432528dc78fedb324f
-
SHA1
22c2770eea77b91b30e5bfc7199a321339ec92dc
-
SHA256
b018f5a66001f1ccb3553465778d7a65d04d7a0925ac925b692bfbedcbc08295
-
SHA512
6aecbe6aae20f2b2e484eaae9a4dfb64ca008c60e11c02de7c8c9559336804a721983b9522431c08979ae307d17e2d202e6e2d208c2ab1f9923bf161e94db890
-
SSDEEP
24576:u2G/nvxW3WieCfYiKFt+77kwwVomlSUXUkv1nKSW8W5xdf9w4/Zo2L9vU3gtTqUK:ubA3jfYilPmlB9NngLfSMouvKEiV
Behavioral task
behavioral1
Sample
b018f5a66001f1ccb3553465778d7a65d04d7a0925ac925b692bfbedcbc08295.exe
Resource
win7-20231215-en
Malware Config
Targets
-
-
Target
b018f5a66001f1ccb3553465778d7a65d04d7a0925ac925b692bfbedcbc08295.exe
-
Size
1.8MB
-
MD5
2654cf7f87e8aa432528dc78fedb324f
-
SHA1
22c2770eea77b91b30e5bfc7199a321339ec92dc
-
SHA256
b018f5a66001f1ccb3553465778d7a65d04d7a0925ac925b692bfbedcbc08295
-
SHA512
6aecbe6aae20f2b2e484eaae9a4dfb64ca008c60e11c02de7c8c9559336804a721983b9522431c08979ae307d17e2d202e6e2d208c2ab1f9923bf161e94db890
-
SSDEEP
24576:u2G/nvxW3WieCfYiKFt+77kwwVomlSUXUkv1nKSW8W5xdf9w4/Zo2L9vU3gtTqUK:ubA3jfYilPmlB9NngLfSMouvKEiV
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Detects executables packed with SmartAssembly
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1