General
-
Target
LisectAVT_2403002C_5.exe
-
Size
866KB
-
Sample
240725-b8tbgs1dll
-
MD5
46d84050a5e6430175830f12e6c9580b
-
SHA1
c461e610864e12f40e6c6ce1b6effc3e4dedca09
-
SHA256
a2defbcf2c896a3df3f3cdf612a6d2a82a7b40b82b3a4a561b775e67f11ef56d
-
SHA512
7b5b83d27778ae066bd400a8e09d95023339b8eed3a110a30bc44538b2a534ee4683139a9cf31b5fd3d5219cc1c6be0787604e9967a435e139c84a47cf3d0fff
-
SSDEEP
12288:def6BEY7s9Z8ovT2RUUOKIiBAPIAIm61gCf9uSMnu54H6x:deq7s9Z2OK67E1gCluSTxx
Behavioral task
behavioral1
Sample
LisectAVT_2403002C_5.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
LisectAVT_2403002C_5.exe
Resource
win10v2004-20240709-en
Malware Config
Targets
-
-
Target
LisectAVT_2403002C_5.exe
-
Size
866KB
-
MD5
46d84050a5e6430175830f12e6c9580b
-
SHA1
c461e610864e12f40e6c6ce1b6effc3e4dedca09
-
SHA256
a2defbcf2c896a3df3f3cdf612a6d2a82a7b40b82b3a4a561b775e67f11ef56d
-
SHA512
7b5b83d27778ae066bd400a8e09d95023339b8eed3a110a30bc44538b2a534ee4683139a9cf31b5fd3d5219cc1c6be0787604e9967a435e139c84a47cf3d0fff
-
SSDEEP
12288:def6BEY7s9Z8ovT2RUUOKIiBAPIAIm61gCf9uSMnu54H6x:deq7s9Z2OK67E1gCluSTxx
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1Scheduled Task
1