General
-
Target
afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N
-
Size
1.9MB
-
Sample
241103-qv3ekavjgy
-
MD5
38c14805a17436bc0118dfaa6547eec0
-
SHA1
77ee261fd0d14577058bd1114bfd4a34aa0990e6
-
SHA256
afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081
-
SHA512
bfec5fa0c4d45ebcc26bf18f3ccf0ea9b6bc6de62ce1ddfc012ef69f42c2bf45d90a3dc5f6537e62e6d0e30247eb0c2b5495249b01d0b158b6a73dd29e657754
-
SSDEEP
24576:W7/weHc1lJq2tB/pw97SSwEWJSwDFrs7+6pa7gv6a9MrYetY5Q62xo2CPV84uMY1:qqpji7SxFgz7XM7metv6s2N8W
Static task
static1
Behavioral task
behavioral1
Sample
afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N
-
Size
1.9MB
-
MD5
38c14805a17436bc0118dfaa6547eec0
-
SHA1
77ee261fd0d14577058bd1114bfd4a34aa0990e6
-
SHA256
afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081
-
SHA512
bfec5fa0c4d45ebcc26bf18f3ccf0ea9b6bc6de62ce1ddfc012ef69f42c2bf45d90a3dc5f6537e62e6d0e30247eb0c2b5495249b01d0b158b6a73dd29e657754
-
SSDEEP
24576:W7/weHc1lJq2tB/pw97SSwEWJSwDFrs7+6pa7gv6a9MrYetY5Q62xo2CPV84uMY1:qqpji7SxFgz7XM7metv6s2N8W
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Modifies WinLogon for persistence
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1