General
-
Target
7adf09fdd827cb01637e9cd12a916c3f8d842b9f894463b35f2f8ddc33b2c8e0.exe
-
Size
2.2MB
-
Sample
241123-1wgjlaymc1
-
MD5
9216216496e6c197b4e285475c9bebac
-
SHA1
8594c011aae6acc0d656e99217df04a046608962
-
SHA256
7adf09fdd827cb01637e9cd12a916c3f8d842b9f894463b35f2f8ddc33b2c8e0
-
SHA512
618884f78c133a55bbdc5c230f4459c587b79ccbe94e856e371fca7a9266b8a8f627ce63c63ca35f79e65788748c2837893f14efb8365b39e1ed3e520b512a17
-
SSDEEP
49152:ubA3jith94T3QphlQ5Tye/90Ytxj5rP6PFAfpG:ubb7jhi5ee/mYt55JhG
Behavioral task
behavioral1
Sample
7adf09fdd827cb01637e9cd12a916c3f8d842b9f894463b35f2f8ddc33b2c8e0.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7adf09fdd827cb01637e9cd12a916c3f8d842b9f894463b35f2f8ddc33b2c8e0.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
7adf09fdd827cb01637e9cd12a916c3f8d842b9f894463b35f2f8ddc33b2c8e0.exe
-
Size
2.2MB
-
MD5
9216216496e6c197b4e285475c9bebac
-
SHA1
8594c011aae6acc0d656e99217df04a046608962
-
SHA256
7adf09fdd827cb01637e9cd12a916c3f8d842b9f894463b35f2f8ddc33b2c8e0
-
SHA512
618884f78c133a55bbdc5c230f4459c587b79ccbe94e856e371fca7a9266b8a8f627ce63c63ca35f79e65788748c2837893f14efb8365b39e1ed3e520b512a17
-
SSDEEP
49152:ubA3jith94T3QphlQ5Tye/90Ytxj5rP6PFAfpG:ubb7jhi5ee/mYt55JhG
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1