General
-
Target
test.exe
-
Size
1.1MB
-
Sample
241105-z1vfksydjg
-
MD5
4a00e42d19f9bae651f70e79cd5ef162
-
SHA1
b196db8fc96765b65f9da36f7c55664e9c756bb9
-
SHA256
de577ab25710e06a94efa8f9b0b2f425377cb8df68c5068ce65204ee5b28a067
-
SHA512
69735af42d4d44ff7814beacee6a0b80a841f44f09962a5d42ab9fdac673971fcd10e76de53b25ce19693fe6826e557fc8fe4721b3611ac22efbfa76f7405055
-
SSDEEP
24576:u2G/nvxW3WieCs/p/1uLbrQZVK8qBlKSUd:ubA3j7TQL3Ane
Behavioral task
behavioral1
Sample
test.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
test.exe
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
test.exe
-
Size
1.1MB
-
MD5
4a00e42d19f9bae651f70e79cd5ef162
-
SHA1
b196db8fc96765b65f9da36f7c55664e9c756bb9
-
SHA256
de577ab25710e06a94efa8f9b0b2f425377cb8df68c5068ce65204ee5b28a067
-
SHA512
69735af42d4d44ff7814beacee6a0b80a841f44f09962a5d42ab9fdac673971fcd10e76de53b25ce19693fe6826e557fc8fe4721b3611ac22efbfa76f7405055
-
SSDEEP
24576:u2G/nvxW3WieCs/p/1uLbrQZVK8qBlKSUd:ubA3j7TQL3Ane
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Deletes itself
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1