General
-
Target
88779158ac60b121c524491e5959f42fd7a98861540d6a4ffc375b17ab23b489N
-
Size
1.4MB
-
Sample
241106-w7vs5svjhs
-
MD5
778a4d77c6ff79fd7a705c719951dfa0
-
SHA1
55a597e7fc6d496889618bba175e7f2c61cced4b
-
SHA256
88779158ac60b121c524491e5959f42fd7a98861540d6a4ffc375b17ab23b489
-
SHA512
d6bf52c9115b934df88daf167311e7916d6d8e3d1b44e57a3dc41c8cab755eb8bb2c50a1d4c52791e07630a447aa46987f1503b70a485095ce67893cfe4900bb
-
SSDEEP
24576:6Ipz2s/RGlw9qwD9TQkzTOfC0Bg/qa9Yyym2Iicp/4xc:6Qzulw0bg/qAymlV
Behavioral task
behavioral1
Sample
88779158ac60b121c524491e5959f42fd7a98861540d6a4ffc375b17ab23b489N.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
88779158ac60b121c524491e5959f42fd7a98861540d6a4ffc375b17ab23b489N
-
Size
1.4MB
-
MD5
778a4d77c6ff79fd7a705c719951dfa0
-
SHA1
55a597e7fc6d496889618bba175e7f2c61cced4b
-
SHA256
88779158ac60b121c524491e5959f42fd7a98861540d6a4ffc375b17ab23b489
-
SHA512
d6bf52c9115b934df88daf167311e7916d6d8e3d1b44e57a3dc41c8cab755eb8bb2c50a1d4c52791e07630a447aa46987f1503b70a485095ce67893cfe4900bb
-
SSDEEP
24576:6Ipz2s/RGlw9qwD9TQkzTOfC0Bg/qa9Yyym2Iicp/4xc:6Qzulw0bg/qAymlV
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1Scheduled Task
1