General
-
Target
14fe2e3c3da4f7833248a28afe183191cb4a0bb4412fd6b7efdd2606542c8041N
-
Size
973KB
-
Sample
241001-tcxcda1hkc
-
MD5
9e2d06b56585b3d7cf2453d98c53de20
-
SHA1
5858c3ae6bdf0e1a2f4d15d02094cf0172946c52
-
SHA256
14fe2e3c3da4f7833248a28afe183191cb4a0bb4412fd6b7efdd2606542c8041
-
SHA512
c6b32a070a557c3bc23c807a419305f6bf91033a9d4a010c110c1221962718c3d0bb582ac20ff9e0344caa504545ea5aacfc17979003327fda1c192b962d4010
-
SSDEEP
12288:/hhBMuext92N3cit1RGJV/H0uQ1PjmzBd5EBy10cgZMc29ZxasnLlDD:/5E92NRzO/UFdmBchH29Zsg9
Static task
static1
Behavioral task
behavioral1
Sample
14fe2e3c3da4f7833248a28afe183191cb4a0bb4412fd6b7efdd2606542c8041N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
14fe2e3c3da4f7833248a28afe183191cb4a0bb4412fd6b7efdd2606542c8041N.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
14fe2e3c3da4f7833248a28afe183191cb4a0bb4412fd6b7efdd2606542c8041N
-
Size
973KB
-
MD5
9e2d06b56585b3d7cf2453d98c53de20
-
SHA1
5858c3ae6bdf0e1a2f4d15d02094cf0172946c52
-
SHA256
14fe2e3c3da4f7833248a28afe183191cb4a0bb4412fd6b7efdd2606542c8041
-
SHA512
c6b32a070a557c3bc23c807a419305f6bf91033a9d4a010c110c1221962718c3d0bb582ac20ff9e0344caa504545ea5aacfc17979003327fda1c192b962d4010
-
SSDEEP
12288:/hhBMuext92N3cit1RGJV/H0uQ1PjmzBd5EBy10cgZMc29ZxasnLlDD:/5E92NRzO/UFdmBchH29Zsg9
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1