General
-
Target
7b9ddd730758e941e2fb8284386135a2d507d424a7021490c9227d79d36e9f15.exe
-
Size
1.0MB
-
Sample
241103-dk447atalg
-
MD5
5e45962bd393c13522e7c9311b6e86a0
-
SHA1
1ae02d2752979c4800ccd9c5a1c99c5a084211c8
-
SHA256
7b9ddd730758e941e2fb8284386135a2d507d424a7021490c9227d79d36e9f15
-
SHA512
20fa7439c5eb76b91fa999f3f49e1d690bb66ded1d9400b781c39ba6558108a6563f9ad42d94e9ca02f9d979c427169e349fdc120eb85228b243eb73086714b7
-
SSDEEP
12288:kvOGN+Wr70uGCeYo5kuMri42BC26ms+Y9/Jdh3rUfSdJm/TJ8D/Xq7qLmKMa2:6+C700o5kuYswd7uSd4TaD/Xq3K/2
Behavioral task
behavioral1
Sample
7b9ddd730758e941e2fb8284386135a2d507d424a7021490c9227d79d36e9f15.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7b9ddd730758e941e2fb8284386135a2d507d424a7021490c9227d79d36e9f15.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
7b9ddd730758e941e2fb8284386135a2d507d424a7021490c9227d79d36e9f15.exe
-
Size
1.0MB
-
MD5
5e45962bd393c13522e7c9311b6e86a0
-
SHA1
1ae02d2752979c4800ccd9c5a1c99c5a084211c8
-
SHA256
7b9ddd730758e941e2fb8284386135a2d507d424a7021490c9227d79d36e9f15
-
SHA512
20fa7439c5eb76b91fa999f3f49e1d690bb66ded1d9400b781c39ba6558108a6563f9ad42d94e9ca02f9d979c427169e349fdc120eb85228b243eb73086714b7
-
SSDEEP
12288:kvOGN+Wr70uGCeYo5kuMri42BC26ms+Y9/Jdh3rUfSdJm/TJ8D/Xq7qLmKMa2:6+C700o5kuYswd7uSd4TaD/Xq3K/2
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1Scheduled Task
1