General
-
Target
d37a1b95368b3ba6cb549ee14af0e69891ad7b5f66e49f919f0e7e527532e676.exe
-
Size
3.4MB
-
Sample
241211-gc6vlayrc1
-
MD5
54454792b2656605daffe22adb7750c0
-
SHA1
14bc4b6c3b169b26efcb22b9dd913c9bdcb25c61
-
SHA256
d37a1b95368b3ba6cb549ee14af0e69891ad7b5f66e49f919f0e7e527532e676
-
SHA512
279c5bd9e09e45e86df9cd2421aa0a61f724ad8332e0f5409d33ed2ecea4ad4b38ed9c71e67184f08ff23088df5652d75afbb793eded50ef8230effd2597b679
-
SSDEEP
49152:s3GMesEktOcTPuKyI1qd5i6JTnl9gs6ToWbepfutWiNFg20+5J3pS8Dzy8:nuEktPuu1qbhwDoWHgt+5JZS8fy8
Behavioral task
behavioral1
Sample
d37a1b95368b3ba6cb549ee14af0e69891ad7b5f66e49f919f0e7e527532e676.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d37a1b95368b3ba6cb549ee14af0e69891ad7b5f66e49f919f0e7e527532e676.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
d37a1b95368b3ba6cb549ee14af0e69891ad7b5f66e49f919f0e7e527532e676.exe
-
Size
3.4MB
-
MD5
54454792b2656605daffe22adb7750c0
-
SHA1
14bc4b6c3b169b26efcb22b9dd913c9bdcb25c61
-
SHA256
d37a1b95368b3ba6cb549ee14af0e69891ad7b5f66e49f919f0e7e527532e676
-
SHA512
279c5bd9e09e45e86df9cd2421aa0a61f724ad8332e0f5409d33ed2ecea4ad4b38ed9c71e67184f08ff23088df5652d75afbb793eded50ef8230effd2597b679
-
SSDEEP
49152:s3GMesEktOcTPuKyI1qd5i6JTnl9gs6ToWbepfutWiNFg20+5J3pS8Dzy8:nuEktPuu1qbhwDoWHgt+5JZS8fy8
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1Scheduled Task
1