General
-
Target
43364f9ca16420322a0acc57427148cb0cfa0df14884538f0ce8627dbc9ec983N.exe
-
Size
1.8MB
-
Sample
241205-yhmgksypes
-
MD5
8691b8256074b5ec561c7ef05e4f1830
-
SHA1
6f1deb8e7057f3669b6d92b14de7086a4a0395eb
-
SHA256
43364f9ca16420322a0acc57427148cb0cfa0df14884538f0ce8627dbc9ec983
-
SHA512
e7fcaaf6e787f7eda8ff55ef8bc16d36f48c9b8ec1ebf7a7c7c5be84a05f3a0b1e6e898734cfd2c817922f3151efdfbc8ebe8916153ef6a67930df838036a29e
-
SSDEEP
49152:XWqKKPZ1snfJ+rqDPuQDLME5MT4rDQNpfh:pKKZ1sRD2Q3N5MT4r
Behavioral task
behavioral1
Sample
43364f9ca16420322a0acc57427148cb0cfa0df14884538f0ce8627dbc9ec983N.exe
Resource
win7-20241023-en
Malware Config
Targets
-
-
Target
43364f9ca16420322a0acc57427148cb0cfa0df14884538f0ce8627dbc9ec983N.exe
-
Size
1.8MB
-
MD5
8691b8256074b5ec561c7ef05e4f1830
-
SHA1
6f1deb8e7057f3669b6d92b14de7086a4a0395eb
-
SHA256
43364f9ca16420322a0acc57427148cb0cfa0df14884538f0ce8627dbc9ec983
-
SHA512
e7fcaaf6e787f7eda8ff55ef8bc16d36f48c9b8ec1ebf7a7c7c5be84a05f3a0b1e6e898734cfd2c817922f3151efdfbc8ebe8916153ef6a67930df838036a29e
-
SSDEEP
49152:XWqKKPZ1snfJ+rqDPuQDLME5MT4rDQNpfh:pKKZ1sRD2Q3N5MT4r
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1