Resubmissions
16-11-2024 10:31
241116-mkna4sylcm 10General
-
Target
Bridgewebsvc.exe
-
Size
828KB
-
Sample
241116-mkna4sylcm
-
MD5
fddea23e803e9e5de212e4c0475c8f93
-
SHA1
c4426bf36ce54917155da2bfbec1508c5a799664
-
SHA256
f014b4dd1600fb5ecd92de55165573415c2d7ee184a4f70f2f975ee7909150f6
-
SHA512
05459fc75998ee306e8de7e544aaf744e5c6e1930dcb7e02b94a566a7ad6e874a9fe50a78a1da50b4e7110282e49353f8ced586117d772b600b84d09ee070591
-
SSDEEP
12288:F+RK+UfXST5/rKMyFckcb8M41AT0z/GAFPz3DhsHxrofdV:5STuMMATKPTVgxr4
Behavioral task
behavioral1
Sample
Bridgewebsvc.exe
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
Bridgewebsvc.exe
-
Size
828KB
-
MD5
fddea23e803e9e5de212e4c0475c8f93
-
SHA1
c4426bf36ce54917155da2bfbec1508c5a799664
-
SHA256
f014b4dd1600fb5ecd92de55165573415c2d7ee184a4f70f2f975ee7909150f6
-
SHA512
05459fc75998ee306e8de7e544aaf744e5c6e1930dcb7e02b94a566a7ad6e874a9fe50a78a1da50b4e7110282e49353f8ced586117d772b600b84d09ee070591
-
SSDEEP
12288:F+RK+UfXST5/rKMyFckcb8M41AT0z/GAFPz3DhsHxrofdV:5STuMMATKPTVgxr4
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Modifies WinLogon for persistence
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1