General
-
Target
6bcef1348babeda5a1a126d6d076b2ab3bf793ec07da7aba3df963cb8ddad1b9.exe
-
Size
2.5MB
-
Sample
241126-akc4xstnet
-
MD5
be9712de7e19243e35aa7ce6e2e23345
-
SHA1
ac38c04570e5cd80627c28fa9fb5be0965f0f7c6
-
SHA256
6bcef1348babeda5a1a126d6d076b2ab3bf793ec07da7aba3df963cb8ddad1b9
-
SHA512
5a3178d5dce31eb0f64ffa104d17a7165775acfc78efa7f459e777ea56a005152f3b424532c6736f439bde45d2fd750f72583ba631e3d49a9eb8c2c6fc6542ae
-
SSDEEP
49152:WnYLYb30luEfXmrkLbZZ0McjfzJ47720B4ZjYsYt54AjaTWXHtL:WnSYovmrkLbEjrJ477KZjkX4nTWXHtL
Behavioral task
behavioral1
Sample
6bcef1348babeda5a1a126d6d076b2ab3bf793ec07da7aba3df963cb8ddad1b9.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6bcef1348babeda5a1a126d6d076b2ab3bf793ec07da7aba3df963cb8ddad1b9.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
6bcef1348babeda5a1a126d6d076b2ab3bf793ec07da7aba3df963cb8ddad1b9.exe
-
Size
2.5MB
-
MD5
be9712de7e19243e35aa7ce6e2e23345
-
SHA1
ac38c04570e5cd80627c28fa9fb5be0965f0f7c6
-
SHA256
6bcef1348babeda5a1a126d6d076b2ab3bf793ec07da7aba3df963cb8ddad1b9
-
SHA512
5a3178d5dce31eb0f64ffa104d17a7165775acfc78efa7f459e777ea56a005152f3b424532c6736f439bde45d2fd750f72583ba631e3d49a9eb8c2c6fc6542ae
-
SSDEEP
49152:WnYLYb30luEfXmrkLbZZ0McjfzJ47720B4ZjYsYt54AjaTWXHtL:WnSYovmrkLbEjrJ477KZjkX4nTWXHtL
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1Scheduled Task
1