General
-
Target
1fbcb895a6e34fb2a307c0c9896b7922ea723e5eea183fa319c0142c5a761fdf.exe
-
Size
1.2MB
-
Sample
240418-h4gkfsee32
-
MD5
49267a1e4c9cbb955209690e1d82d1d1
-
SHA1
47fb7d48398a2049f84c4a68c96ea5ac27513cbe
-
SHA256
1fbcb895a6e34fb2a307c0c9896b7922ea723e5eea183fa319c0142c5a761fdf
-
SHA512
26b679d6ef43b50c77d8190f3058f9732c2077b23934e44b76ed90fdad2f0df6a48b8faf8f6c80e673f27167d004ec33d2e2f01f439ea4e88039bb1930a70c98
-
SSDEEP
24576:1R28aergLxCcjZGKCKFuTBHNWdd2HAxWnUDTJ/yS3Rh:7JaDKf4p4UD1v
Behavioral task
behavioral1
Sample
1fbcb895a6e34fb2a307c0c9896b7922ea723e5eea183fa319c0142c5a761fdf.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1fbcb895a6e34fb2a307c0c9896b7922ea723e5eea183fa319c0142c5a761fdf.exe
Resource
win10v2004-20240412-en
Malware Config
Targets
-
-
Target
1fbcb895a6e34fb2a307c0c9896b7922ea723e5eea183fa319c0142c5a761fdf.exe
-
Size
1.2MB
-
MD5
49267a1e4c9cbb955209690e1d82d1d1
-
SHA1
47fb7d48398a2049f84c4a68c96ea5ac27513cbe
-
SHA256
1fbcb895a6e34fb2a307c0c9896b7922ea723e5eea183fa319c0142c5a761fdf
-
SHA512
26b679d6ef43b50c77d8190f3058f9732c2077b23934e44b76ed90fdad2f0df6a48b8faf8f6c80e673f27167d004ec33d2e2f01f439ea4e88039bb1930a70c98
-
SSDEEP
24576:1R28aergLxCcjZGKCKFuTBHNWdd2HAxWnUDTJ/yS3Rh:7JaDKf4p4UD1v
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
MITRE ATT&CK Matrix ATT&CK v13
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1