General
-
Target
4e69fcf73418a08fcb8b3e7e2ecb43c4.bin
-
Size
1.9MB
-
Sample
241203-bk994ayjhr
-
MD5
506427fe33564023a5cfbab89764688f
-
SHA1
a6c993c9126d333ee500946ba95fca2ace38a4b2
-
SHA256
277d73a3f82fe52428738a64f8cfdb8d8dc9c6fcba57de752cc69361bb8ee0b6
-
SHA512
4994bea4a5e78af0d148e0fb7adfa21e8810950a8b7a186547fa336232caeea13717a57e3ce5071c9b7af9e180a5131f324da698fc3c51987d8ef16a22d46726
-
SSDEEP
49152:vA6sfCDsMXjkJCZk7T2hBQzONSevgRtDe8LMThcDY9KgWzjlo:vALKgMTkoZonzONUn68LkhQYBWn2
Behavioral task
behavioral1
Sample
fa78ac8f4c94923c7e53a3bf6936b46aff02f7746ee9518460c2d529ea2982d4.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
fa78ac8f4c94923c7e53a3bf6936b46aff02f7746ee9518460c2d529ea2982d4.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
fa78ac8f4c94923c7e53a3bf6936b46aff02f7746ee9518460c2d529ea2982d4.exe
-
Size
2.3MB
-
MD5
4e69fcf73418a08fcb8b3e7e2ecb43c4
-
SHA1
a3ecd09f65ca4e7821a0b7f8596edcd679573f5b
-
SHA256
fa78ac8f4c94923c7e53a3bf6936b46aff02f7746ee9518460c2d529ea2982d4
-
SHA512
a6d1a2b6363ad8a560567e6c11a48f8d1bc4cdfc36474902edf39f676440be82619aae52279121a776486d0edfe7a448f0fe9707b27ae760c1d6dd0201f6adc3
-
SSDEEP
49152:BwpUwcTZ0rUinysyVZl5LCCcG3RTXM34FIIPWYJxuQfUgtFneJ8BG5U:Bw1ctUyjTLC8puaX/neJ8BgU
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Modifies WinLogon for persistence
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1