General
-
Target
8a23e0ccbd2027831ff07599f03b5c1324e080f9415983746de29a6c6ab695fc.exe
-
Size
1.5MB
-
Sample
240828-cdc7fssbmq
-
MD5
31f61e9c68256b4cc089b3703c0e2039
-
SHA1
5ed8cecacc5e6165d43ee91787f72846d2e8ad01
-
SHA256
8a23e0ccbd2027831ff07599f03b5c1324e080f9415983746de29a6c6ab695fc
-
SHA512
ae48468132212e4756864fe7ce22d55c35d53cadd482aebabd62ec9d724ea3786879d9364563613140a43fa6c63a6c5cc1ee1775e4e0e9977aee3b748d8a6df1
-
SSDEEP
24576:yuDXTIGaPhEYzUzA0bOvbKAO1WMbkiSfLAo9Ffze20S4OIsAMWlXl9h2DvpfsTCu:1Djlabwz9Sv61kiQKvS4OUMI4hfaD
Static task
static1
Behavioral task
behavioral1
Sample
8a23e0ccbd2027831ff07599f03b5c1324e080f9415983746de29a6c6ab695fc.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8a23e0ccbd2027831ff07599f03b5c1324e080f9415983746de29a6c6ab695fc.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
8a23e0ccbd2027831ff07599f03b5c1324e080f9415983746de29a6c6ab695fc.exe
-
Size
1.5MB
-
MD5
31f61e9c68256b4cc089b3703c0e2039
-
SHA1
5ed8cecacc5e6165d43ee91787f72846d2e8ad01
-
SHA256
8a23e0ccbd2027831ff07599f03b5c1324e080f9415983746de29a6c6ab695fc
-
SHA512
ae48468132212e4756864fe7ce22d55c35d53cadd482aebabd62ec9d724ea3786879d9364563613140a43fa6c63a6c5cc1ee1775e4e0e9977aee3b748d8a6df1
-
SSDEEP
24576:yuDXTIGaPhEYzUzA0bOvbKAO1WMbkiSfLAo9Ffze20S4OIsAMWlXl9h2DvpfsTCu:1Djlabwz9Sv61kiQKvS4OUMI4hfaD
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Detect Umbral payload
-
Modifies WinLogon for persistence
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Disables Task Manager via registry modification
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
5