General
-
Target
dc.exe
-
Size
2.5MB
-
Sample
240619-nj2msazake
-
MD5
0dfb562500251ae8c085e6e8db7fe3d1
-
SHA1
00a1c6bb0bd7d99d54e96b714592f4a070b81641
-
SHA256
29c1eca587a0180b5cdfc0e939ef5b1bb201335d2dea2a1c6427ce37af68325a
-
SHA512
05578a1553b38cd22570cb5b8bc6e3d4064ab6cf5d05a8537a5a4dd849aac4eda933ccf94d7f765ed03c40b67c6cd89412e15bdbad3a493681cad17387270004
-
SSDEEP
49152:aozCQ2xc1knReFIs/2M0HVcg+Fk1gMO9:aozCQ31YK+HKvH
Behavioral task
behavioral1
Sample
dc.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
dc.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
dc.exe
-
Size
2.5MB
-
MD5
0dfb562500251ae8c085e6e8db7fe3d1
-
SHA1
00a1c6bb0bd7d99d54e96b714592f4a070b81641
-
SHA256
29c1eca587a0180b5cdfc0e939ef5b1bb201335d2dea2a1c6427ce37af68325a
-
SHA512
05578a1553b38cd22570cb5b8bc6e3d4064ab6cf5d05a8537a5a4dd849aac4eda933ccf94d7f765ed03c40b67c6cd89412e15bdbad3a493681cad17387270004
-
SSDEEP
49152:aozCQ2xc1knReFIs/2M0HVcg+Fk1gMO9:aozCQ31YK+HKvH
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1Scheduled Task
1