General
-
Target
ab7307731f5026b64631fe11b117e29ed3a4c851df388238048b6370bb99fee0N
-
Size
1.6MB
-
Sample
241026-s8hy7awarh
-
MD5
8ce0a9103ab10fed54094a3a2d1146e0
-
SHA1
4aef0ddaa8d065170c0ff2cc099c31aa6b1085aa
-
SHA256
ab7307731f5026b64631fe11b117e29ed3a4c851df388238048b6370bb99fee0
-
SHA512
cf0adcb740f1eec83e6477bc487cf3a0d152222e08f186b78a674e0e9178b591e7088c5a2d2763dbd6eed55e3eef2bbdfaddf1791158e7dad7c891577f71e76f
-
SSDEEP
24576:NsoVH984fBm2iMbyrpEGwFQ0Gm3eQk31V6hK5r898Qs:NAtJeGwkm3eQk31rF8V
Behavioral task
behavioral1
Sample
ab7307731f5026b64631fe11b117e29ed3a4c851df388238048b6370bb99fee0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ab7307731f5026b64631fe11b117e29ed3a4c851df388238048b6370bb99fee0N.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
ab7307731f5026b64631fe11b117e29ed3a4c851df388238048b6370bb99fee0N
-
Size
1.6MB
-
MD5
8ce0a9103ab10fed54094a3a2d1146e0
-
SHA1
4aef0ddaa8d065170c0ff2cc099c31aa6b1085aa
-
SHA256
ab7307731f5026b64631fe11b117e29ed3a4c851df388238048b6370bb99fee0
-
SHA512
cf0adcb740f1eec83e6477bc487cf3a0d152222e08f186b78a674e0e9178b591e7088c5a2d2763dbd6eed55e3eef2bbdfaddf1791158e7dad7c891577f71e76f
-
SSDEEP
24576:NsoVH984fBm2iMbyrpEGwFQ0Gm3eQk31V6hK5r898Qs:NAtJeGwkm3eQk31rF8V
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1Scheduled Task
1