General
-
Target
f85216456a620efc2e49a5a5b1ba7a44ad57ae4fc5da07ce19a4b6e861696c0f
-
Size
783KB
-
Sample
240919-d4318sygqq
-
MD5
8946d7f1d5ac2d71c78fa58bea789831
-
SHA1
e481e69b29f81d40c1e89b17324745db00846960
-
SHA256
f85216456a620efc2e49a5a5b1ba7a44ad57ae4fc5da07ce19a4b6e861696c0f
-
SHA512
b77af5c6d74c36cd227e653b2e9b3d599f12decea74f0a62c435e28724136a413358ae226dd562b9a24f14208908444041da94d86d7ba32d1e87ab6bf012461b
-
SSDEEP
12288:mqnOYxdAgpoNeF91rg5iFdr0yQ9gYx+EIpakCYJRU7Q9bWoFzqK:m+OQbpbgsFdAyQvzSqaq8q
Behavioral task
behavioral1
Sample
f85216456a620efc2e49a5a5b1ba7a44ad57ae4fc5da07ce19a4b6e861696c0f.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f85216456a620efc2e49a5a5b1ba7a44ad57ae4fc5da07ce19a4b6e861696c0f.exe
Resource
win10v2004-20240910-en
Malware Config
Targets
-
-
Target
f85216456a620efc2e49a5a5b1ba7a44ad57ae4fc5da07ce19a4b6e861696c0f
-
Size
783KB
-
MD5
8946d7f1d5ac2d71c78fa58bea789831
-
SHA1
e481e69b29f81d40c1e89b17324745db00846960
-
SHA256
f85216456a620efc2e49a5a5b1ba7a44ad57ae4fc5da07ce19a4b6e861696c0f
-
SHA512
b77af5c6d74c36cd227e653b2e9b3d599f12decea74f0a62c435e28724136a413358ae226dd562b9a24f14208908444041da94d86d7ba32d1e87ab6bf012461b
-
SSDEEP
12288:mqnOYxdAgpoNeF91rg5iFdr0yQ9gYx+EIpakCYJRU7Q9bWoFzqK:m+OQbpbgsFdAyQvzSqaq8q
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1