General
-
Target
b1d43056050ebf9e4698475c07022fb3c6e39d721abaf32d459d5bf50ed1b515
-
Size
827KB
-
Sample
241105-qbppcstpgm
-
MD5
7dd8afbb49ae5a087a23e98931557da2
-
SHA1
925549dc8d4b1f21905d6430796b88c795648ed2
-
SHA256
b1d43056050ebf9e4698475c07022fb3c6e39d721abaf32d459d5bf50ed1b515
-
SHA512
4e64d47e0c0b452546054a00491c60137ec9f4373554bda5a8e4099e803a9829e98bf130d2bec9cae9bc21eff41fc24487f50993e3316f2230c82eb08c5f9edb
-
SSDEEP
12288:H9nfsdPp5UPYBf4HFrsulbCAx2Qg8UcYps8CNfhfG7Ik2Q:H9fjPYBCFrPlb59Us8CDfQIk2Q
Behavioral task
behavioral1
Sample
b1d43056050ebf9e4698475c07022fb3c6e39d721abaf32d459d5bf50ed1b515.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b1d43056050ebf9e4698475c07022fb3c6e39d721abaf32d459d5bf50ed1b515.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
b1d43056050ebf9e4698475c07022fb3c6e39d721abaf32d459d5bf50ed1b515
-
Size
827KB
-
MD5
7dd8afbb49ae5a087a23e98931557da2
-
SHA1
925549dc8d4b1f21905d6430796b88c795648ed2
-
SHA256
b1d43056050ebf9e4698475c07022fb3c6e39d721abaf32d459d5bf50ed1b515
-
SHA512
4e64d47e0c0b452546054a00491c60137ec9f4373554bda5a8e4099e803a9829e98bf130d2bec9cae9bc21eff41fc24487f50993e3316f2230c82eb08c5f9edb
-
SSDEEP
12288:H9nfsdPp5UPYBf4HFrsulbCAx2Qg8UcYps8CNfhfG7Ik2Q:H9fjPYBCFrPlb59Us8CDfQIk2Q
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Modifies WinLogon for persistence
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1