General
-
Target
51b284bd1d8865e9d4fe9544c81882a7790a2ce32458249a25c9698329a0ea02
-
Size
2.1MB
-
Sample
240313-x9s8rsea2v
-
MD5
f4a675a3b47a85daa2e7905eba314760
-
SHA1
0e01e07ff8ed4ca94a1dcad2f2af26fd8cf431ba
-
SHA256
51b284bd1d8865e9d4fe9544c81882a7790a2ce32458249a25c9698329a0ea02
-
SHA512
d8a9cd69392fc775cef5d714128ca08a39a6a111e57ff248b64ba4126b89bbff4ca39bb5c117450e405619cefbec7ca01ad931c6ae7d9cb14c6d1822d478152d
-
SSDEEP
49152:D3B3BNkmneOg9/liOjsCpfAwq1jwaCJtn:zFBNkB9NiOjsC5A91jw5
Behavioral task
behavioral1
Sample
51b284bd1d8865e9d4fe9544c81882a7790a2ce32458249a25c9698329a0ea02.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
51b284bd1d8865e9d4fe9544c81882a7790a2ce32458249a25c9698329a0ea02.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
51b284bd1d8865e9d4fe9544c81882a7790a2ce32458249a25c9698329a0ea02
-
Size
2.1MB
-
MD5
f4a675a3b47a85daa2e7905eba314760
-
SHA1
0e01e07ff8ed4ca94a1dcad2f2af26fd8cf431ba
-
SHA256
51b284bd1d8865e9d4fe9544c81882a7790a2ce32458249a25c9698329a0ea02
-
SHA512
d8a9cd69392fc775cef5d714128ca08a39a6a111e57ff248b64ba4126b89bbff4ca39bb5c117450e405619cefbec7ca01ad931c6ae7d9cb14c6d1822d478152d
-
SSDEEP
49152:D3B3BNkmneOg9/liOjsCpfAwq1jwaCJtn:zFBNkB9NiOjsC5A91jw5
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Modifies WinLogon for persistence
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Detects executables packed with SmartAssembly
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1