General
-
Target
ef198c2bd03333e40dc6e723bb985f6507bc3e3662f0986a7db6ee0157ea7142.exe
-
Size
984KB
-
Sample
241210-1ypmzs1nht
-
MD5
b6d8aa9bbde0aadb7ded1a4096540fe7
-
SHA1
5e78b639c6a8ca53f03462c8bc5443429f1982ae
-
SHA256
ef198c2bd03333e40dc6e723bb985f6507bc3e3662f0986a7db6ee0157ea7142
-
SHA512
d24fb4771bb54f44dfd23505c491eca811aeb4ce14e40204a58849951f9c706e156683f228cb39e7aacb88323eceae8e2e3fb2328188f730aec097c672c0fa55
-
SSDEEP
12288:MyEIOYTNEIf5AycvEhKIV6tEcln0Ai2a61h3cQ9Fk+ntGoWuzsx1oiLgoi:MyErYT+PvXIUln/1GJgoi
Behavioral task
behavioral1
Sample
ef198c2bd03333e40dc6e723bb985f6507bc3e3662f0986a7db6ee0157ea7142.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
ef198c2bd03333e40dc6e723bb985f6507bc3e3662f0986a7db6ee0157ea7142.exe
-
Size
984KB
-
MD5
b6d8aa9bbde0aadb7ded1a4096540fe7
-
SHA1
5e78b639c6a8ca53f03462c8bc5443429f1982ae
-
SHA256
ef198c2bd03333e40dc6e723bb985f6507bc3e3662f0986a7db6ee0157ea7142
-
SHA512
d24fb4771bb54f44dfd23505c491eca811aeb4ce14e40204a58849951f9c706e156683f228cb39e7aacb88323eceae8e2e3fb2328188f730aec097c672c0fa55
-
SSDEEP
12288:MyEIOYTNEIf5AycvEhKIV6tEcln0Ai2a61h3cQ9Fk+ntGoWuzsx1oiLgoi:MyErYT+PvXIUln/1GJgoi
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1Scheduled Task
1