General
-
Target
13aeda86aafde4051d7ca9280dac9a67.exe
-
Size
1.4MB
-
Sample
240423-pzl3psgc81
-
MD5
13aeda86aafde4051d7ca9280dac9a67
-
SHA1
fd4a6168c79c28d6e25be7c799ffd25c2dbd69d0
-
SHA256
01ef75f76ae452476b1de15a3238617f33c4b685e5bb423de49f34f44b0a0111
-
SHA512
ddfc9a2a5a2f3b83023eecf4053de1930ebf9486d1cff869ab6d2199c5978926b2c4a6468358c627f4cff16a235c8d23b98711d8b3bf608ed03f4e4d7d7d0194
-
SSDEEP
24576:Lw/d/t+9SDGMoRNkj63uYnqzW1yqCc/CfVsdEYXHo1o9edFt4k:M/d/HP6+Ynb18Kfdx3IoIt
Behavioral task
behavioral1
Sample
13aeda86aafde4051d7ca9280dac9a67.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
13aeda86aafde4051d7ca9280dac9a67.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
13aeda86aafde4051d7ca9280dac9a67.exe
-
Size
1.4MB
-
MD5
13aeda86aafde4051d7ca9280dac9a67
-
SHA1
fd4a6168c79c28d6e25be7c799ffd25c2dbd69d0
-
SHA256
01ef75f76ae452476b1de15a3238617f33c4b685e5bb423de49f34f44b0a0111
-
SHA512
ddfc9a2a5a2f3b83023eecf4053de1930ebf9486d1cff869ab6d2199c5978926b2c4a6468358c627f4cff16a235c8d23b98711d8b3bf608ed03f4e4d7d7d0194
-
SSDEEP
24576:Lw/d/t+9SDGMoRNkj63uYnqzW1yqCc/CfVsdEYXHo1o9edFt4k:M/d/HP6+Ynb18Kfdx3IoIt
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Modifies WinLogon for persistence
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1