General
-
Target
1554ae8f1316eadf351b3e6f5e7fc9e6.exe
-
Size
3.2MB
-
Sample
241030-2r72esshpj
-
MD5
1554ae8f1316eadf351b3e6f5e7fc9e6
-
SHA1
1fe722cd6f6e6739a2566c920931bc2f057ac55c
-
SHA256
5bdd5d335f1dce7bff7ad597aa12c5c36d2831b58d4a1a37650fab7b070c6e23
-
SHA512
56bf054fa85f534a5b5896a21b4b511c564ffbb0a8b1685054c521d09a9122c848c5818d6518092d33da4c02b79dea6622ef7fd48ab22271522a9d7878a2883d
-
SSDEEP
49152:UbA30LfTBVuy0VtNUBslYt04P0GliFkO6Uo67iX0bCLuI9+E8Dt:Ub/7nL0jCB6q0goyUonuI998Dt
Behavioral task
behavioral1
Sample
1554ae8f1316eadf351b3e6f5e7fc9e6.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
1554ae8f1316eadf351b3e6f5e7fc9e6.exe
-
Size
3.2MB
-
MD5
1554ae8f1316eadf351b3e6f5e7fc9e6
-
SHA1
1fe722cd6f6e6739a2566c920931bc2f057ac55c
-
SHA256
5bdd5d335f1dce7bff7ad597aa12c5c36d2831b58d4a1a37650fab7b070c6e23
-
SHA512
56bf054fa85f534a5b5896a21b4b511c564ffbb0a8b1685054c521d09a9122c848c5818d6518092d33da4c02b79dea6622ef7fd48ab22271522a9d7878a2883d
-
SSDEEP
49152:UbA30LfTBVuy0VtNUBslYt04P0GliFkO6Uo67iX0bCLuI9+E8Dt:Ub/7nL0jCB6q0goyUonuI998Dt
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
2