General
-
Target
a9ac10090fed177df3867fc88eda57dd852c595dde10953b7b798523e1043152
-
Size
3.2MB
-
Sample
240514-a8svaacd8s
-
MD5
1553f67a0859a3057cde01f77db9dbc0
-
SHA1
2cfe40d1fea16093e16c96a35f3240b98da9a5e1
-
SHA256
a9ac10090fed177df3867fc88eda57dd852c595dde10953b7b798523e1043152
-
SHA512
4ff68e4ad4299aa2ca2be8dfd1742d641cf9aee6b687f94b1e3c68062630b2e167a13550a8a184c8ff5a3df1da5b3182ebd29759a84a219af37a8688df6f0de5
-
SSDEEP
49152:vC0Fl8v/911bwaEYpdYUVsk3DZGAy55kBsfJGAW6KyWUcPmWQpE:vC0Fl8v/qXYrv5tG9uKJGAWl5N
Behavioral task
behavioral1
Sample
a9ac10090fed177df3867fc88eda57dd852c595dde10953b7b798523e1043152.exe
Resource
win7-20240221-en
Malware Config
Targets
-
-
Target
a9ac10090fed177df3867fc88eda57dd852c595dde10953b7b798523e1043152
-
Size
3.2MB
-
MD5
1553f67a0859a3057cde01f77db9dbc0
-
SHA1
2cfe40d1fea16093e16c96a35f3240b98da9a5e1
-
SHA256
a9ac10090fed177df3867fc88eda57dd852c595dde10953b7b798523e1043152
-
SHA512
4ff68e4ad4299aa2ca2be8dfd1742d641cf9aee6b687f94b1e3c68062630b2e167a13550a8a184c8ff5a3df1da5b3182ebd29759a84a219af37a8688df6f0de5
-
SSDEEP
49152:vC0Fl8v/911bwaEYpdYUVsk3DZGAy55kBsfJGAW6KyWUcPmWQpE:vC0Fl8v/qXYrv5tG9uKJGAWl5N
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Detects executables packed with SmartAssembly
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1