General
-
Target
c98996c31b4e223beb8d807100536c6c8dc19ec50a10365d893fa00b270f4627N.exe
-
Size
973KB
-
Sample
241205-q4c62atjcj
-
MD5
0f03b3a0ca9a75f7b900a4e773020ec0
-
SHA1
1a952a87fb4e476eb9e111cee8d355e57426aadd
-
SHA256
c98996c31b4e223beb8d807100536c6c8dc19ec50a10365d893fa00b270f4627
-
SHA512
f243a27db37556c220032d2f6612193c4577f998e17a35ea9260cd942ff9211d5e12ffa4de8794081b3edd5e789206c147f2d2b9a16ddd82e2fd7b4b8247c6e7
-
SSDEEP
12288:nhhBMuext92N3cit1RGJV/H0uQ1PjmzBd5EBy10cgZMc29ZxasnLlDD:n5E92NRzO/UFdmBchH29Zsg9
Static task
static1
Behavioral task
behavioral1
Sample
c98996c31b4e223beb8d807100536c6c8dc19ec50a10365d893fa00b270f4627N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c98996c31b4e223beb8d807100536c6c8dc19ec50a10365d893fa00b270f4627N.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
c98996c31b4e223beb8d807100536c6c8dc19ec50a10365d893fa00b270f4627N.exe
-
Size
973KB
-
MD5
0f03b3a0ca9a75f7b900a4e773020ec0
-
SHA1
1a952a87fb4e476eb9e111cee8d355e57426aadd
-
SHA256
c98996c31b4e223beb8d807100536c6c8dc19ec50a10365d893fa00b270f4627
-
SHA512
f243a27db37556c220032d2f6612193c4577f998e17a35ea9260cd942ff9211d5e12ffa4de8794081b3edd5e789206c147f2d2b9a16ddd82e2fd7b4b8247c6e7
-
SSDEEP
12288:nhhBMuext92N3cit1RGJV/H0uQ1PjmzBd5EBy10cgZMc29ZxasnLlDD:n5E92NRzO/UFdmBchH29Zsg9
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1