General
-
Target
93e88c0eeb14a25944205694761570f5e1700e260910134faf82eafe33d0ee1d.exe
-
Size
1.1MB
-
Sample
241113-wezlmawhlr
-
MD5
a4ea523b57cc90848732ee08117646d0
-
SHA1
a9706d93616af18f00027c6d9c29b6b877497c1e
-
SHA256
93e88c0eeb14a25944205694761570f5e1700e260910134faf82eafe33d0ee1d
-
SHA512
b280ef14615e5ebd8aece055c6a1eed253a68b47c26df4e92ed16df054db86d838495056806ff87893e04717e939983aae05dcf4c90eb1c5d2176728a0716a05
-
SSDEEP
24576:AMYPCI+q+U4cIG409ozWucypk1Nd4AX+iB/YjuM6kyh+i:ABPZ0Kr1FXHB/guM6k+V
Behavioral task
behavioral1
Sample
93e88c0eeb14a25944205694761570f5e1700e260910134faf82eafe33d0ee1d.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
93e88c0eeb14a25944205694761570f5e1700e260910134faf82eafe33d0ee1d.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
93e88c0eeb14a25944205694761570f5e1700e260910134faf82eafe33d0ee1d.exe
-
Size
1.1MB
-
MD5
a4ea523b57cc90848732ee08117646d0
-
SHA1
a9706d93616af18f00027c6d9c29b6b877497c1e
-
SHA256
93e88c0eeb14a25944205694761570f5e1700e260910134faf82eafe33d0ee1d
-
SHA512
b280ef14615e5ebd8aece055c6a1eed253a68b47c26df4e92ed16df054db86d838495056806ff87893e04717e939983aae05dcf4c90eb1c5d2176728a0716a05
-
SSDEEP
24576:AMYPCI+q+U4cIG409ozWucypk1Nd4AX+iB/YjuM6kyh+i:ABPZ0Kr1FXHB/guM6k+V
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Modifies WinLogon for persistence
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1