Analysis

  • max time kernel
    94s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-11-2024 06:10

General

  • Target

    ec1f3a0c64bbd4848a74a1870a9e5499b9bfbeb1604d5fff2916dca5bf003a22.exe

  • Size

    1.2MB

  • MD5

    f0a0864093df41cb85df01a16bc0bc5d

  • SHA1

    4b88bc13c13a92bc9d7908db545e2903483bf022

  • SHA256

    ec1f3a0c64bbd4848a74a1870a9e5499b9bfbeb1604d5fff2916dca5bf003a22

  • SHA512

    037cbe49791dfee97d86db41138785360d21720f397f98701f65a5b11ac93bc48a83d54abc45c766e7c5d71c78ae361ebc4e18e16362e80e6eb8c7804a6366e3

  • SSDEEP

    24576:FXjf6WYaN4kHhE5w0e1OKQREvixjVJAU9z0DTaBcvsgr3hoVnUOy0:pxaG1OZEvixjVJAU9z0zsggfh

Score
10/10

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ec1f3a0c64bbd4848a74a1870a9e5499b9bfbeb1604d5fff2916dca5bf003a22.exe
    "C:\Users\Admin\AppData\Local\Temp\ec1f3a0c64bbd4848a74a1870a9e5499b9bfbeb1604d5fff2916dca5bf003a22.exe"
    1⤵
      PID:4312

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4312-0-0x00007FFB5BBD3000-0x00007FFB5BBD5000-memory.dmp

      Filesize

      8KB

    • memory/4312-1-0x00000000003B0000-0x00000000004F4000-memory.dmp

      Filesize

      1.3MB

    • memory/4312-2-0x00007FFB5BBD0000-0x00007FFB5C691000-memory.dmp

      Filesize

      10.8MB

    • memory/4312-3-0x00007FFB5BBD0000-0x00007FFB5C691000-memory.dmp

      Filesize

      10.8MB