General
-
Target
6706364c78566c589c6c45217e852b02.bin
-
Size
1.5MB
-
Sample
241212-bthansznar
-
MD5
e794399f01b6fb0866da222ca754c720
-
SHA1
4b4fbe9aa4e5693b1544031515986bc9b8d16fa4
-
SHA256
02f08c858916067c2b1a33de8748c875efb373fe93c2b6cff3887021b89c5e3f
-
SHA512
19eacb7f35e5a02559e35d1937aff496dab51cfcec4263e226ead0b477030580bc4105bcfe9c40341af7fafe6c042d88c2e26e684b9e405e654cf4632df3201f
-
SSDEEP
24576:UhfdPOb5vOXfZMVhESwzUvRfA0ZIq9q3z+Rr8AEOXPVWN6q+txCIV1OSibpfQzzE:8dPOb52XqmUvRfAvc98AvfVWwq+t4qlw
Static task
static1
Behavioral task
behavioral1
Sample
87fa5d0d7912d7a1295e7d585f41797bc5c76a5ea7d9d7b362fcc20472715f9b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
87fa5d0d7912d7a1295e7d585f41797bc5c76a5ea7d9d7b362fcc20472715f9b.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
87fa5d0d7912d7a1295e7d585f41797bc5c76a5ea7d9d7b362fcc20472715f9b.exe
-
Size
1.9MB
-
MD5
6706364c78566c589c6c45217e852b02
-
SHA1
e0bc8a67a91d5ea42c072e63f36f4993d9620c2d
-
SHA256
87fa5d0d7912d7a1295e7d585f41797bc5c76a5ea7d9d7b362fcc20472715f9b
-
SHA512
3aed779886dcb08bac7eda66cf4b4adbcf420ac0dfc702ef645f231cc40f0801cd16b35cafb12dc5b7125c237df65df091366c884ce20158447752507e1023f7
-
SSDEEP
49152:JV9LiEUzT6V+qiRGVcqb++v8PlPwvwOfPGZyM1b2DAWsM:JnezTGriRRq3vGNCJfPOy4b
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Modifies WinLogon for persistence
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1