General
-
Target
DCRatBuild.exe
-
Size
1.2MB
-
Sample
240611-la9wpasdnj
-
MD5
0d9d4b342cfddce2cf1685b2de5ca7cc
-
SHA1
ed6ca21979a879db35d086756838ae137bc99480
-
SHA256
ec122a93a086eb5a3c24c82767ce389bf3b3f516db319af234e18868cbb181fd
-
SHA512
f92a442825f640b9c57d4d68811ac5c354bd96a199b5954d4debcf2b3d88f9c598723fb55d2daf8b66b61beee882564c2b6c4e27cf8488755c6e23e31106bcab
-
SSDEEP
24576:u2G/nvxW3WieCvj2mk5vYoW4YdMVbxOpuiuKRF/k9:ubA3jL8QoWLAxOx9F2
Behavioral task
behavioral1
Sample
DCRatBuild.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
DCRatBuild.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
DCRatBuild.exe
-
Size
1.2MB
-
MD5
0d9d4b342cfddce2cf1685b2de5ca7cc
-
SHA1
ed6ca21979a879db35d086756838ae137bc99480
-
SHA256
ec122a93a086eb5a3c24c82767ce389bf3b3f516db319af234e18868cbb181fd
-
SHA512
f92a442825f640b9c57d4d68811ac5c354bd96a199b5954d4debcf2b3d88f9c598723fb55d2daf8b66b61beee882564c2b6c4e27cf8488755c6e23e31106bcab
-
SSDEEP
24576:u2G/nvxW3WieCvj2mk5vYoW4YdMVbxOpuiuKRF/k9:ubA3jL8QoWLAxOx9F2
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Modifies WinLogon for persistence
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Disables Task Manager via registry modification
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1