General
-
Target
9bf682da18ee541ddafba4948eb06320N.exe
-
Size
784KB
-
Sample
240725-jaqfyayele
-
MD5
9bf682da18ee541ddafba4948eb06320
-
SHA1
5fc59eb41e89bafd2949ef9d52fb43578b228632
-
SHA256
fcccb01cef6b3c72fdd7d86e997492ba8125f18249cf19e63ec1b9e85b7c7482
-
SHA512
19bdc574adc9fe0f7766c3a7054d8aa4c0c9da7abd608352d52f88a6ab9de17c74519a1b2245a36fa185083a76c86e97c28777882c2333dc88b3265228be88ba
-
SSDEEP
12288:+qnO8YpD1oOJp+Ce1PSiG2jfIBoI5DyDwYMDxFesH0ioBw7oKk2:++ORToOWSi5gBoS4wYUJ0eo2
Behavioral task
behavioral1
Sample
9bf682da18ee541ddafba4948eb06320N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
9bf682da18ee541ddafba4948eb06320N.exe
Resource
win10v2004-20240709-en
Malware Config
Targets
-
-
Target
9bf682da18ee541ddafba4948eb06320N.exe
-
Size
784KB
-
MD5
9bf682da18ee541ddafba4948eb06320
-
SHA1
5fc59eb41e89bafd2949ef9d52fb43578b228632
-
SHA256
fcccb01cef6b3c72fdd7d86e997492ba8125f18249cf19e63ec1b9e85b7c7482
-
SHA512
19bdc574adc9fe0f7766c3a7054d8aa4c0c9da7abd608352d52f88a6ab9de17c74519a1b2245a36fa185083a76c86e97c28777882c2333dc88b3265228be88ba
-
SSDEEP
12288:+qnO8YpD1oOJp+Ce1PSiG2jfIBoI5DyDwYMDxFesH0ioBw7oKk2:++ORToOWSi5gBoS4wYUJ0eo2
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1