General
-
Target
13aeda86aafde4051d7ca9280dac9a67.bin
-
Size
987KB
-
Sample
240425-bdke4ace53
-
MD5
b05cecf9b9ad589795971122d1b09e13
-
SHA1
0d2920bbc56b3f17fd725e1c6d86ca7c38870b6c
-
SHA256
00fbff74e62a2049c82198024aacf705b2d87aa55b3be4dc78d8547f4ed1e087
-
SHA512
b476e00d4c0d1cb5553328e75ee1ac75342b43d0bcde3929c562f058a925ec195cb1960de6aad0a5bd11f78e28fa186c640c25966177089931791b153aa4ffa7
-
SSDEEP
24576:Lhi/1npbxiHV2rdMLyerIJr7bJdhmUMhylmfgbRBdRq3Q3sfrf:Fs1n9a2hgIJHbJdhmhyljbPbcDf
Behavioral task
behavioral1
Sample
01ef75f76ae452476b1de15a3238617f33c4b685e5bb423de49f34f44b0a0111.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
01ef75f76ae452476b1de15a3238617f33c4b685e5bb423de49f34f44b0a0111.exe
Resource
win10v2004-20240412-en
Malware Config
Targets
-
-
Target
01ef75f76ae452476b1de15a3238617f33c4b685e5bb423de49f34f44b0a0111.exe
-
Size
1.4MB
-
MD5
13aeda86aafde4051d7ca9280dac9a67
-
SHA1
fd4a6168c79c28d6e25be7c799ffd25c2dbd69d0
-
SHA256
01ef75f76ae452476b1de15a3238617f33c4b685e5bb423de49f34f44b0a0111
-
SHA512
ddfc9a2a5a2f3b83023eecf4053de1930ebf9486d1cff869ab6d2199c5978926b2c4a6468358c627f4cff16a235c8d23b98711d8b3bf608ed03f4e4d7d7d0194
-
SSDEEP
24576:Lw/d/t+9SDGMoRNkj63uYnqzW1yqCc/CfVsdEYXHo1o9edFt4k:M/d/HP6+Ynb18Kfdx3IoIt
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Modifies WinLogon for persistence
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1