General
-
Target
6c209d47e8f22b36b7da51d0c78315673eb3f3b7da11321f399547dc44e561e0
-
Size
2.7MB
-
Sample
241104-3n9lhszdlh
-
MD5
f601b78e8cbc6c6d9e9809ffecf0f4e7
-
SHA1
e172fc87fe7fb7545f359b4a952e7aa73c057b7b
-
SHA256
6c209d47e8f22b36b7da51d0c78315673eb3f3b7da11321f399547dc44e561e0
-
SHA512
93dcfec4f3c2e6863a3fb4ee72db7ae8e32283be6e5c5c9f9942c44681a4abc8fc2c86e1beae511eb2bfe3d94dca2cc4039ac01a25e9521ff4fbf91434aa5383
-
SSDEEP
49152:q509dAf7LzZYFibGstHpR6upyGbj+/BpKnvyIxVV/XDoAfmt:q5F7R7GgHpR6lGfCpKaIxVV/r0
Static task
static1
Behavioral task
behavioral1
Sample
6c209d47e8f22b36b7da51d0c78315673eb3f3b7da11321f399547dc44e561e0.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6c209d47e8f22b36b7da51d0c78315673eb3f3b7da11321f399547dc44e561e0.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
6c209d47e8f22b36b7da51d0c78315673eb3f3b7da11321f399547dc44e561e0
-
Size
2.7MB
-
MD5
f601b78e8cbc6c6d9e9809ffecf0f4e7
-
SHA1
e172fc87fe7fb7545f359b4a952e7aa73c057b7b
-
SHA256
6c209d47e8f22b36b7da51d0c78315673eb3f3b7da11321f399547dc44e561e0
-
SHA512
93dcfec4f3c2e6863a3fb4ee72db7ae8e32283be6e5c5c9f9942c44681a4abc8fc2c86e1beae511eb2bfe3d94dca2cc4039ac01a25e9521ff4fbf91434aa5383
-
SSDEEP
49152:q509dAf7LzZYFibGstHpR6upyGbj+/BpKnvyIxVV/XDoAfmt:q5F7R7GgHpR6lGfCpKaIxVV/r0
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
1Component Object Model Hijacking
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Event Triggered Execution
1Component Object Model Hijacking
1Scheduled Task/Job
1Scheduled Task
1