General
-
Target
3a2f1bf0b03ca3faaa196da40be33a132949957dabdb94f6be65c09dbdf9ec15.exe
-
Size
1.2MB
-
Sample
241124-hbwtnstrem
-
MD5
e5a4be0eb47c462ad72240167b00d6eb
-
SHA1
09793e20889984c4d8f18385052baa82202afca8
-
SHA256
3a2f1bf0b03ca3faaa196da40be33a132949957dabdb94f6be65c09dbdf9ec15
-
SHA512
6c2445109f25acb7d8fb545b66db590ba2c4bcc0237829ce99f7bf0c4f135e37b1b5b4afba2477b807bf36c529d679479265fec7657f89faf052cf532a2e2bd1
-
SSDEEP
12288:F0GtwVUTytoIn41c6iHKnkUxCj2AqeMQmwWe0ZQyRWkhuq3nbep3+bKDZhW/lc4q:ptDZcpHKnkuGKFplpC+bKlAtc06z
Static task
static1
Behavioral task
behavioral1
Sample
3a2f1bf0b03ca3faaa196da40be33a132949957dabdb94f6be65c09dbdf9ec15.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
3a2f1bf0b03ca3faaa196da40be33a132949957dabdb94f6be65c09dbdf9ec15.exe
-
Size
1.2MB
-
MD5
e5a4be0eb47c462ad72240167b00d6eb
-
SHA1
09793e20889984c4d8f18385052baa82202afca8
-
SHA256
3a2f1bf0b03ca3faaa196da40be33a132949957dabdb94f6be65c09dbdf9ec15
-
SHA512
6c2445109f25acb7d8fb545b66db590ba2c4bcc0237829ce99f7bf0c4f135e37b1b5b4afba2477b807bf36c529d679479265fec7657f89faf052cf532a2e2bd1
-
SSDEEP
12288:F0GtwVUTytoIn41c6iHKnkUxCj2AqeMQmwWe0ZQyRWkhuq3nbep3+bKDZhW/lc4q:ptDZcpHKnkuGKFplpC+bKlAtc06z
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1