Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/11/2024, 06:14

General

  • Target

    ec1f3a0c64bbd4848a74a1870a9e5499b9bfbeb1604d5fff2916dca5bf003a22.exe

  • Size

    1.2MB

  • MD5

    f0a0864093df41cb85df01a16bc0bc5d

  • SHA1

    4b88bc13c13a92bc9d7908db545e2903483bf022

  • SHA256

    ec1f3a0c64bbd4848a74a1870a9e5499b9bfbeb1604d5fff2916dca5bf003a22

  • SHA512

    037cbe49791dfee97d86db41138785360d21720f397f98701f65a5b11ac93bc48a83d54abc45c766e7c5d71c78ae361ebc4e18e16362e80e6eb8c7804a6366e3

  • SSDEEP

    24576:FXjf6WYaN4kHhE5w0e1OKQREvixjVJAU9z0DTaBcvsgr3hoVnUOy0:pxaG1OZEvixjVJAU9z0zsggfh

Score
10/10

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ec1f3a0c64bbd4848a74a1870a9e5499b9bfbeb1604d5fff2916dca5bf003a22.exe
    "C:\Users\Admin\AppData\Local\Temp\ec1f3a0c64bbd4848a74a1870a9e5499b9bfbeb1604d5fff2916dca5bf003a22.exe"
    1⤵
      PID:2932

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2932-0-0x00007FFD6EFA3000-0x00007FFD6EFA5000-memory.dmp

      Filesize

      8KB

    • memory/2932-1-0x0000000000BC0000-0x0000000000D04000-memory.dmp

      Filesize

      1.3MB

    • memory/2932-2-0x00007FFD6EFA0000-0x00007FFD6FA61000-memory.dmp

      Filesize

      10.8MB

    • memory/2932-3-0x00007FFD6EFA0000-0x00007FFD6FA61000-memory.dmp

      Filesize

      10.8MB