General
-
Target
4D95EA8721D0A84B69C2D60951A8A65E.exe
-
Size
631KB
-
Sample
241107-t1cymswbmm
-
MD5
4d95ea8721d0a84b69c2d60951a8a65e
-
SHA1
b3b9230b284c32e8d35c65b6b31d0a1b729c6d7c
-
SHA256
1aeaabc57a89dd8508a5e997236b91b3cd7e584dad94700fcad9d8637d2b926d
-
SHA512
7500b73aa452a6452fd6fe41df0fbffa96821918df34fcff2a29bf2072f5fdb02886fa0945f5d567fefcf30de6d042b4e17e6760bb5e5a3ceba11767316c3fee
-
SSDEEP
12288:Cr2N7ewZcHjHkoP19jpVgUbdxGU2NjCa8UQGqIJ7uHXNI8W2Zx:Cr2EEypVg4x8NmtjS+
Behavioral task
behavioral1
Sample
4D95EA8721D0A84B69C2D60951A8A65E.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4D95EA8721D0A84B69C2D60951A8A65E.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
4D95EA8721D0A84B69C2D60951A8A65E.exe
-
Size
631KB
-
MD5
4d95ea8721d0a84b69c2d60951a8a65e
-
SHA1
b3b9230b284c32e8d35c65b6b31d0a1b729c6d7c
-
SHA256
1aeaabc57a89dd8508a5e997236b91b3cd7e584dad94700fcad9d8637d2b926d
-
SHA512
7500b73aa452a6452fd6fe41df0fbffa96821918df34fcff2a29bf2072f5fdb02886fa0945f5d567fefcf30de6d042b4e17e6760bb5e5a3ceba11767316c3fee
-
SSDEEP
12288:Cr2N7ewZcHjHkoP19jpVgUbdxGU2NjCa8UQGqIJ7uHXNI8W2Zx:Cr2EEypVg4x8NmtjS+
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Modifies WinLogon for persistence
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1