General
-
Target
4667f5be1002ce912e5590cca8da93b6.bin
-
Size
1.1MB
-
Sample
241209-blh71asjhl
-
MD5
ab00a5d9269b567fc983fdfb1873eed7
-
SHA1
35aeacefadd0f5e62b9eaec2cd796e8e95a8b04e
-
SHA256
ea35e9404c24a02e79df74209be0e4a5b7e5805683394c6b2d46b1feb37ac9b5
-
SHA512
fecea5e95c7c476a40458763faff23a0e36e277d28d5d5cf069db496dc7b0a31049b0eac4f5e5965b6b49f660669c82273904b38ef935082b1f84486f1e95648
-
SSDEEP
24576:8wmJqcMYrfZQYZ1K7BtEWp/SV24PwEK1ntlLAL6rrxPFVDGz:ejM2ZVZGCVs7L7l0LMrhDw
Behavioral task
behavioral1
Sample
fcfa3c615b1c3c703e0ebfaf3fa68093b3894f4b9b7b5b37a5283e419f44022e.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
fcfa3c615b1c3c703e0ebfaf3fa68093b3894f4b9b7b5b37a5283e419f44022e.exe
-
Size
1.5MB
-
MD5
4667f5be1002ce912e5590cca8da93b6
-
SHA1
2e408e483dd447b69d2e938218989265fbfdc2af
-
SHA256
fcfa3c615b1c3c703e0ebfaf3fa68093b3894f4b9b7b5b37a5283e419f44022e
-
SHA512
cdc57befaf7bad8917cc885b394f37d9dac3beabca5d07ab74cfee24f076dc088c2631ad2176dd7b9e62c555692b4c51e3280d5cf5d432ea5172db4ab8fa8c7f
-
SSDEEP
24576:YvpWPh9nUNea6cQ/VUPoF/VPwrEDgbqeFrQqvvlsDJ+drpDn3fQK/759qiuiMjTP:+W8NA/VUPoFVwrIIV+DJGfZ19qig
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1Scheduled Task
1