General
-
Target
6fe3954e5bf41385b5002f96e4bab15545dee6ab4278c2d6455a65157f4e8e9f.exe
-
Size
4.7MB
-
Sample
240728-bpptyssgmc
-
MD5
0c8a0a7c4e92809c7f8303d35d7f0d84
-
SHA1
9cebe3c7e1d1698edb7e512847b3d6e9846d7e52
-
SHA256
6fe3954e5bf41385b5002f96e4bab15545dee6ab4278c2d6455a65157f4e8e9f
-
SHA512
0544f9abf5a3105cf8229132fe839f4866a1b56f2ee16c8c06f450c549f6ba715f7b4a039a91207df6afa856a985e3e793945648546c1e93f82add6d9cae412a
-
SSDEEP
98304:Aqwf7ZW2WRBeGGj16dJKmyRN1vAsEVgqyu3OimIkJAr0S:Aqwfo2yUGbJKmEWQu3OYxr0S
Static task
static1
Behavioral task
behavioral1
Sample
6fe3954e5bf41385b5002f96e4bab15545dee6ab4278c2d6455a65157f4e8e9f.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6fe3954e5bf41385b5002f96e4bab15545dee6ab4278c2d6455a65157f4e8e9f.exe
Resource
win10v2004-20240709-en
Malware Config
Targets
-
-
Target
6fe3954e5bf41385b5002f96e4bab15545dee6ab4278c2d6455a65157f4e8e9f.exe
-
Size
4.7MB
-
MD5
0c8a0a7c4e92809c7f8303d35d7f0d84
-
SHA1
9cebe3c7e1d1698edb7e512847b3d6e9846d7e52
-
SHA256
6fe3954e5bf41385b5002f96e4bab15545dee6ab4278c2d6455a65157f4e8e9f
-
SHA512
0544f9abf5a3105cf8229132fe839f4866a1b56f2ee16c8c06f450c549f6ba715f7b4a039a91207df6afa856a985e3e793945648546c1e93f82add6d9cae412a
-
SSDEEP
98304:Aqwf7ZW2WRBeGGj16dJKmyRN1vAsEVgqyu3OimIkJAr0S:Aqwfo2yUGbJKmEWQu3OYxr0S
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Modifies WinLogon for persistence
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
4Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1