Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-11-2024 05:29
Behavioral task
behavioral1
Sample
e67db40f7067f297f30456b72319fe2c2e45bb674da5249a177fb56e9e4b5e21.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e67db40f7067f297f30456b72319fe2c2e45bb674da5249a177fb56e9e4b5e21.exe
Resource
win10v2004-20241007-en
General
-
Target
e67db40f7067f297f30456b72319fe2c2e45bb674da5249a177fb56e9e4b5e21.exe
-
Size
2.0MB
-
MD5
af127315dc7d02567c4f94b0e08011f2
-
SHA1
48e50bb2a141a7efe3b119f91bd33841df450055
-
SHA256
e67db40f7067f297f30456b72319fe2c2e45bb674da5249a177fb56e9e4b5e21
-
SHA512
d0d086e9d6e72637f56d69983b7d067e4d0a20729aafff44b72517032a80b3943737e0e645044a51d7f060f6cdb4e38a0fd8e12c72339bf7818be668cabd16d4
-
SSDEEP
49152:dpEYPUUpXKs7cnhyvc16K7bV9+UpbCpR2aAY:dpEYcOT7chwqB7bCpRJA
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
resource yara_rule behavioral1/memory/2256-1-0x0000000000C80000-0x0000000000E8A000-memory.dmp dcrat -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2256 e67db40f7067f297f30456b72319fe2c2e45bb674da5249a177fb56e9e4b5e21.exe