General
-
Target
308238649d710b938f9e0cf04bf52a0a3a89b253310035afdc0ba8e846732c61.exe
-
Size
2.3MB
-
Sample
241123-a16q6szjcm
-
MD5
8856304a8bad8f3c4132c28042b8df80
-
SHA1
82adc02d2ccdc3485e6edb00ac36f71f2d804158
-
SHA256
308238649d710b938f9e0cf04bf52a0a3a89b253310035afdc0ba8e846732c61
-
SHA512
c5ab3dca5ad9c0577dcce69a6941259e67066141dc297e07a53b487ea0a51a68c9b79934ce443dc4a3f5e7eee65521cbc13b2f7afe7f594ee7ec5db59f484499
-
SSDEEP
49152:UbA300qL5o66QwgVAVph9QBoyycpwgPGdnDq3IEPU:UbV7oh9yycFODq3vPU
Behavioral task
behavioral1
Sample
308238649d710b938f9e0cf04bf52a0a3a89b253310035afdc0ba8e846732c61.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
308238649d710b938f9e0cf04bf52a0a3a89b253310035afdc0ba8e846732c61.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
308238649d710b938f9e0cf04bf52a0a3a89b253310035afdc0ba8e846732c61.exe
-
Size
2.3MB
-
MD5
8856304a8bad8f3c4132c28042b8df80
-
SHA1
82adc02d2ccdc3485e6edb00ac36f71f2d804158
-
SHA256
308238649d710b938f9e0cf04bf52a0a3a89b253310035afdc0ba8e846732c61
-
SHA512
c5ab3dca5ad9c0577dcce69a6941259e67066141dc297e07a53b487ea0a51a68c9b79934ce443dc4a3f5e7eee65521cbc13b2f7afe7f594ee7ec5db59f484499
-
SSDEEP
49152:UbA300qL5o66QwgVAVph9QBoyycpwgPGdnDq3IEPU:UbV7oh9yycFODq3vPU
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1