General
-
Target
0cc4a5350887ecd6d55eed9b617d34c43f6579218545d522318f3e6d64460175
-
Size
4.0MB
-
Sample
240531-w9ff8shh23
-
MD5
aac697ab0d583fcc8641ce4365b1fea2
-
SHA1
57ada9976d56f577b18f005dcc369258d70259fc
-
SHA256
0cc4a5350887ecd6d55eed9b617d34c43f6579218545d522318f3e6d64460175
-
SHA512
cbe76916ecdf7d3afabde6459e4d3355db529a22f2fd834ade8e50b61eb62a8ef9f3ff46a7091108bc2f54b40d035f3a26605d1ed65b0e945b2fe7fe07c86071
-
SSDEEP
49152:XYIdUmmujCJIMTmrXMdgjexOXKIDNKKCEBiYvWmiAafeQT/v4QlSVfwRA/ld2MnV:IIav/IMTmzMdgN/xvW1A/QTY1KAwMZP
Behavioral task
behavioral1
Sample
0cc4a5350887ecd6d55eed9b617d34c43f6579218545d522318f3e6d64460175.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
0cc4a5350887ecd6d55eed9b617d34c43f6579218545d522318f3e6d64460175.exe
Resource
win10v2004-20240426-en
Malware Config
Targets
-
-
Target
0cc4a5350887ecd6d55eed9b617d34c43f6579218545d522318f3e6d64460175
-
Size
4.0MB
-
MD5
aac697ab0d583fcc8641ce4365b1fea2
-
SHA1
57ada9976d56f577b18f005dcc369258d70259fc
-
SHA256
0cc4a5350887ecd6d55eed9b617d34c43f6579218545d522318f3e6d64460175
-
SHA512
cbe76916ecdf7d3afabde6459e4d3355db529a22f2fd834ade8e50b61eb62a8ef9f3ff46a7091108bc2f54b40d035f3a26605d1ed65b0e945b2fe7fe07c86071
-
SSDEEP
49152:XYIdUmmujCJIMTmrXMdgjexOXKIDNKKCEBiYvWmiAafeQT/v4QlSVfwRA/ld2MnV:IIav/IMTmzMdgN/xvW1A/QTY1KAwMZP
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Detects executables packed with SmartAssembly
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1