General
-
Target
2deeb0406c386d1135b6bc3ef445d7ee.exe
-
Size
1.4MB
-
Sample
241001-zapgmssgqb
-
MD5
2deeb0406c386d1135b6bc3ef445d7ee
-
SHA1
5f9c85e40de8755348a15eb96579d529cb8c046a
-
SHA256
3ac5dd621c370ef1fd89c945b220fa1dc5a1ccaf30ef5300034acb5cfdfa3e11
-
SHA512
890987e8fb4ee378eca3968b3548ba087c0da6e44c9118e565b7913bde10abdf5501e8c51b7be53b84f2447e4db50360b11d2e5f22cdf1ef3e107265f1ede5c1
-
SSDEEP
24576:KIpz2s/RGlw9qwD9TQkzTOfC0Bg/qa9Yyym2Iicp/4xc:KQzulw0bg/qAymlV
Behavioral task
behavioral1
Sample
2deeb0406c386d1135b6bc3ef445d7ee.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
2deeb0406c386d1135b6bc3ef445d7ee.exe
-
Size
1.4MB
-
MD5
2deeb0406c386d1135b6bc3ef445d7ee
-
SHA1
5f9c85e40de8755348a15eb96579d529cb8c046a
-
SHA256
3ac5dd621c370ef1fd89c945b220fa1dc5a1ccaf30ef5300034acb5cfdfa3e11
-
SHA512
890987e8fb4ee378eca3968b3548ba087c0da6e44c9118e565b7913bde10abdf5501e8c51b7be53b84f2447e4db50360b11d2e5f22cdf1ef3e107265f1ede5c1
-
SSDEEP
24576:KIpz2s/RGlw9qwD9TQkzTOfC0Bg/qa9Yyym2Iicp/4xc:KQzulw0bg/qAymlV
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1Scheduled Task
1