General
-
Target
a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9.exe
-
Size
2.6MB
-
Sample
241125-a4n1jaynct
-
MD5
6b0099a51ebff37e6be647f3fd42aa23
-
SHA1
6313a968fd05ae06f855c8a26dff26494a58970e
-
SHA256
a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9
-
SHA512
788448cca4432ec811c94c3c8d61630de030f22de2730acce9f787e3499556cae74899ee8d3e163863745155ba31c52e98d5b9c4bc7c53dcd097c89813ce4820
-
SSDEEP
49152:emi19AidDFahbHmYZuRJv0uEORfMDsSfFaMpDsrmcY4+:et9zFahbHmR5GOZQL1
Behavioral task
behavioral1
Sample
a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9.exe
-
Size
2.6MB
-
MD5
6b0099a51ebff37e6be647f3fd42aa23
-
SHA1
6313a968fd05ae06f855c8a26dff26494a58970e
-
SHA256
a10989f2c084900d5e2ec9586ae6e899abd9a5f0a3ac87cd3401d288a90341f9
-
SHA512
788448cca4432ec811c94c3c8d61630de030f22de2730acce9f787e3499556cae74899ee8d3e163863745155ba31c52e98d5b9c4bc7c53dcd097c89813ce4820
-
SSDEEP
49152:emi19AidDFahbHmYZuRJv0uEORfMDsSfFaMpDsrmcY4+:et9zFahbHmR5GOZQL1
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1Scheduled Task
1