General
-
Target
09c0c134cbc01a50cc2f9c05504480cb2e1f1a0139d3372e6fe0a22aeff4c694.exe
-
Size
3.3MB
-
Sample
240726-bsa5zaxdql
-
MD5
bc2d438a68d814ce5df1af0dd02ada11
-
SHA1
fc029395beb053a35f3a3dbaefd22a7e5235360a
-
SHA256
09c0c134cbc01a50cc2f9c05504480cb2e1f1a0139d3372e6fe0a22aeff4c694
-
SHA512
a87043218f4dd403990ce02c7b5aa6f62adcba3046eb67bb50db477cd8d7ad4ec2875ff165a04fe5e0798f7a687ee144fbc80aa8a7f175f287b06b931552298d
-
SSDEEP
49152:o8xhCcpCNPulYCFckZHvEdM1jegx7oOCM1Gn72tESduILWMJd33eRkX2EuFgtDGg:NhrChV+cU/NeBPMY72tRR0EuUG
Static task
static1
Behavioral task
behavioral1
Sample
09c0c134cbc01a50cc2f9c05504480cb2e1f1a0139d3372e6fe0a22aeff4c694.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
09c0c134cbc01a50cc2f9c05504480cb2e1f1a0139d3372e6fe0a22aeff4c694.exe
Resource
win10v2004-20240709-en
Malware Config
Targets
-
-
Target
09c0c134cbc01a50cc2f9c05504480cb2e1f1a0139d3372e6fe0a22aeff4c694.exe
-
Size
3.3MB
-
MD5
bc2d438a68d814ce5df1af0dd02ada11
-
SHA1
fc029395beb053a35f3a3dbaefd22a7e5235360a
-
SHA256
09c0c134cbc01a50cc2f9c05504480cb2e1f1a0139d3372e6fe0a22aeff4c694
-
SHA512
a87043218f4dd403990ce02c7b5aa6f62adcba3046eb67bb50db477cd8d7ad4ec2875ff165a04fe5e0798f7a687ee144fbc80aa8a7f175f287b06b931552298d
-
SSDEEP
49152:o8xhCcpCNPulYCFckZHvEdM1jegx7oOCM1Gn72tESduILWMJd33eRkX2EuFgtDGg:NhrChV+cU/NeBPMY72tRR0EuUG
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Modifies WinLogon for persistence
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
4