General
-
Target
6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe
-
Size
2.6MB
-
Sample
241125-3hz5wsypbp
-
MD5
0163b78fa3d6908eb367abed8f3e9e94
-
SHA1
240609d82a62a8017ad3d81ac4271cd7606b5573
-
SHA256
6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773
-
SHA512
f0258f74d10b9d1f3cfab6c36afe7e411b9c3cea7641529b5fc3e62706787c9685b6dfccf3fdde708102b43f517a734572da77407f9f4f1d94754fdec1554748
-
SSDEEP
49152:Z35SQwOGHHy3Gv6KelFCGDZPU542T5eYfn4jmnHwDKni5JsJ:ZpSQEHIKqFCGDZs54+5eYfnCMQ+i5Ja
Behavioral task
behavioral1
Sample
6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe
-
Size
2.6MB
-
MD5
0163b78fa3d6908eb367abed8f3e9e94
-
SHA1
240609d82a62a8017ad3d81ac4271cd7606b5573
-
SHA256
6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773
-
SHA512
f0258f74d10b9d1f3cfab6c36afe7e411b9c3cea7641529b5fc3e62706787c9685b6dfccf3fdde708102b43f517a734572da77407f9f4f1d94754fdec1554748
-
SSDEEP
49152:Z35SQwOGHHy3Gv6KelFCGDZPU542T5eYfn4jmnHwDKni5JsJ:ZpSQEHIKqFCGDZs54+5eYfnCMQ+i5Ja
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1Scheduled Task
1