General
-
Target
3c439a0dac41ce86b80a6b1f2eb8908b.exe
-
Size
2.2MB
-
Sample
241209-jnv9ca1le1
-
MD5
3c439a0dac41ce86b80a6b1f2eb8908b
-
SHA1
1ed48a383c839bf2f601c63e237b02bf532c5f4a
-
SHA256
366f3a7eb764ad2e8b8bd1ebcf389cbfad6034f4c6257f1cdd21a7a3cac768eb
-
SHA512
4c446ed60f907b496a5246371f6afb6b7c39d52e5eb89c20cb4aed402de0b8947441badbd7a8ffe17ca38f910538b71f7ee03aec8c8ee463a529395eb5e8af00
-
SSDEEP
24576:BIKJvchtNfuWMqI/+Q0uwPTJ7CVhqbYziqp66B2eNizXR6yPp+oUP2mBXrp8AfiM:hJiB20rrsiqp6W22ITCdt85aBtuEg
Behavioral task
behavioral1
Sample
3c439a0dac41ce86b80a6b1f2eb8908b.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
3c439a0dac41ce86b80a6b1f2eb8908b.exe
-
Size
2.2MB
-
MD5
3c439a0dac41ce86b80a6b1f2eb8908b
-
SHA1
1ed48a383c839bf2f601c63e237b02bf532c5f4a
-
SHA256
366f3a7eb764ad2e8b8bd1ebcf389cbfad6034f4c6257f1cdd21a7a3cac768eb
-
SHA512
4c446ed60f907b496a5246371f6afb6b7c39d52e5eb89c20cb4aed402de0b8947441badbd7a8ffe17ca38f910538b71f7ee03aec8c8ee463a529395eb5e8af00
-
SSDEEP
24576:BIKJvchtNfuWMqI/+Q0uwPTJ7CVhqbYziqp66B2eNizXR6yPp+oUP2mBXrp8AfiM:hJiB20rrsiqp6W22ITCdt85aBtuEg
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
2