General
-
Target
7a51c74f9e3082a8fdc5b2aa00d105ac565ed3a696b7b59ec562f0a15cf77930.exe
-
Size
4.1MB
-
Sample
241121-a8fjysxgqp
-
MD5
fc12e64914d68aa8fcacfe14eac14973
-
SHA1
ffb90d0353325044a8e77a1b3d32c157e522ec6e
-
SHA256
7a51c74f9e3082a8fdc5b2aa00d105ac565ed3a696b7b59ec562f0a15cf77930
-
SHA512
6d2ff1530504b6a3fccb9bc2fce1e0844b5d901407af185b7b9b827896cfce26ea97f230d1f68ee577cf1665a4d0d2fe5b34532634dcc2bd05d5ff2ce77fbae0
-
SSDEEP
98304:cBLZABTF8Ic94u3YveXYBLZABTF8Ic94u3YveXB:cBZAB+33Y2oBZAB+33Y2x
Behavioral task
behavioral1
Sample
7a51c74f9e3082a8fdc5b2aa00d105ac565ed3a696b7b59ec562f0a15cf77930.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
7a51c74f9e3082a8fdc5b2aa00d105ac565ed3a696b7b59ec562f0a15cf77930.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
7a51c74f9e3082a8fdc5b2aa00d105ac565ed3a696b7b59ec562f0a15cf77930.exe
-
Size
4.1MB
-
MD5
fc12e64914d68aa8fcacfe14eac14973
-
SHA1
ffb90d0353325044a8e77a1b3d32c157e522ec6e
-
SHA256
7a51c74f9e3082a8fdc5b2aa00d105ac565ed3a696b7b59ec562f0a15cf77930
-
SHA512
6d2ff1530504b6a3fccb9bc2fce1e0844b5d901407af185b7b9b827896cfce26ea97f230d1f68ee577cf1665a4d0d2fe5b34532634dcc2bd05d5ff2ce77fbae0
-
SSDEEP
98304:cBLZABTF8Ic94u3YveXYBLZABTF8Ic94u3YveXB:cBZAB+33Y2oBZAB+33Y2x
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Modifies WinLogon for persistence
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1