General
-
Target
proxyscrape_premium_http_proxies (1).txt
-
Size
2KB
-
Sample
241103-xbnkma1djg
-
MD5
08d147adfc524882bcea4c3c3f38dff5
-
SHA1
b2cc792575308a82b4c59f3ad618b24b3484b703
-
SHA256
139e46dca8ddc179df00a7982de7d1dcdfdd4773dd37d8235b9467d3ff765417
-
SHA512
e978a3a223f4d20060cb6c892029edfafb04acde04f9ab419e208f185b39621f978fbce020c5e130c0e73e675ed4be11bdd7a2d810ca6a43f826779eb481c4bd
Static task
static1
Behavioral task
behavioral1
Sample
proxyscrape_premium_http_proxies (1).txt
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
proxyscrape_premium_http_proxies (1).txt
-
Size
2KB
-
MD5
08d147adfc524882bcea4c3c3f38dff5
-
SHA1
b2cc792575308a82b4c59f3ad618b24b3484b703
-
SHA256
139e46dca8ddc179df00a7982de7d1dcdfdd4773dd37d8235b9467d3ff765417
-
SHA512
e978a3a223f4d20060cb6c892029edfafb04acde04f9ab419e208f185b39621f978fbce020c5e130c0e73e675ed4be11bdd7a2d810ca6a43f826779eb481c4bd
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Modifies WinLogon for persistence
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1