General
-
Target
789ff6a462201360bea02c98b4fb3c2d.exe
-
Size
984KB
-
Sample
241206-kr54dsvpan
-
MD5
789ff6a462201360bea02c98b4fb3c2d
-
SHA1
322228573e2be64daf1ee9118af397dfcbc91bce
-
SHA256
0fc310783328a7b162001c9557bbed66e30d45de3ac0362e15f6f28d83ccc7a8
-
SHA512
72517203f735a71d241fb69d55a85315f678dec2f7c02d8b3733e318fe804424cf7079873a296a6e411e2b1364800cc89df45987a8609813f1a64a60b044616e
-
SSDEEP
12288:gyEIOYTNEIf5AycvEhKIV6tEcln0Ai2a61h3cQ9Fk+ntGoWuzsx1oiLgo:gyErYT+PvXIUln/1GJgo
Behavioral task
behavioral1
Sample
789ff6a462201360bea02c98b4fb3c2d.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
789ff6a462201360bea02c98b4fb3c2d.exe
-
Size
984KB
-
MD5
789ff6a462201360bea02c98b4fb3c2d
-
SHA1
322228573e2be64daf1ee9118af397dfcbc91bce
-
SHA256
0fc310783328a7b162001c9557bbed66e30d45de3ac0362e15f6f28d83ccc7a8
-
SHA512
72517203f735a71d241fb69d55a85315f678dec2f7c02d8b3733e318fe804424cf7079873a296a6e411e2b1364800cc89df45987a8609813f1a64a60b044616e
-
SSDEEP
12288:gyEIOYTNEIf5AycvEhKIV6tEcln0Ai2a61h3cQ9Fk+ntGoWuzsx1oiLgo:gyErYT+PvXIUln/1GJgo
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1Scheduled Task
1