Analysis
-
max time kernel
120s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
30-10-2024 01:32
Behavioral task
behavioral1
Sample
8715374320fc2321bbc5abf1dc9b66078c5c95340cea01489be2b57d5daaec4a.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
8715374320fc2321bbc5abf1dc9b66078c5c95340cea01489be2b57d5daaec4a.exe
Resource
win10v2004-20241007-en
General
-
Target
8715374320fc2321bbc5abf1dc9b66078c5c95340cea01489be2b57d5daaec4a.exe
-
Size
1.5MB
-
MD5
ab056d42c37976f8193c5cffccda2bfc
-
SHA1
283348063e4f23e58ca02ec1be680b37c7d0ce53
-
SHA256
8715374320fc2321bbc5abf1dc9b66078c5c95340cea01489be2b57d5daaec4a
-
SHA512
2bb95cd7db4c7a6b6661352e53c1ff47f1307926f89ffee3cb6a11fbca4902a73376d48eae93444557a5190b1c4f5a54ee272e5b0df2236a3cf4ffdbd18d0a90
-
SSDEEP
24576:3yzOHeYgACFEYA12WAi+qJWpZpY9UBCg8y+n4NywcA0Lp4VanbWL3Rnk2to2B:3IgeiCFEX255Y9p4NtAVnUBpto2
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Processes:
resource yara_rule behavioral1/memory/1972-1-0x0000000000200000-0x000000000037E000-memory.dmp dcrat -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
8715374320fc2321bbc5abf1dc9b66078c5c95340cea01489be2b57d5daaec4a.exedescription pid Process Token: SeDebugPrivilege 1972 8715374320fc2321bbc5abf1dc9b66078c5c95340cea01489be2b57d5daaec4a.exe