General
-
Target
36157893d0fbe825ea17747b97b7eb5893059a6f1aa06080deb87ef47410b6bfN.exe
-
Size
1.8MB
-
Sample
241207-2jb9saxnf1
-
MD5
30742ba610a6e66abe158742a400b5a0
-
SHA1
2ae4b096bc3cfdc876204597a74a69f7203e1b1d
-
SHA256
36157893d0fbe825ea17747b97b7eb5893059a6f1aa06080deb87ef47410b6bf
-
SHA512
c4c6da35dbadbf12fba72fe695c056d5dcc5b7793b98ded3c66877f9db4e5360f0371ec08c76ce4f85d6585ee40e3110b41889883f0bc436add314f01cb099e4
-
SSDEEP
49152:WhjAJVllHZrhbBruPk+xjSMX4ODTDF8OcFSkMh:WgVTVXYNX9mOWSkM
Behavioral task
behavioral1
Sample
36157893d0fbe825ea17747b97b7eb5893059a6f1aa06080deb87ef47410b6bfN.exe
Resource
win7-20240708-en
Malware Config
Targets
-
-
Target
36157893d0fbe825ea17747b97b7eb5893059a6f1aa06080deb87ef47410b6bfN.exe
-
Size
1.8MB
-
MD5
30742ba610a6e66abe158742a400b5a0
-
SHA1
2ae4b096bc3cfdc876204597a74a69f7203e1b1d
-
SHA256
36157893d0fbe825ea17747b97b7eb5893059a6f1aa06080deb87ef47410b6bf
-
SHA512
c4c6da35dbadbf12fba72fe695c056d5dcc5b7793b98ded3c66877f9db4e5360f0371ec08c76ce4f85d6585ee40e3110b41889883f0bc436add314f01cb099e4
-
SSDEEP
49152:WhjAJVllHZrhbBruPk+xjSMX4ODTDF8OcFSkMh:WgVTVXYNX9mOWSkM
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1Scheduled Task
1