Analysis
-
max time kernel
14s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
17-12-2024 23:20
Behavioral task
behavioral1
Sample
1b2534124e710965155b5603b8856226b17188ec14cfb3094f9e35f2d2f25e46N.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
1b2534124e710965155b5603b8856226b17188ec14cfb3094f9e35f2d2f25e46N.exe
Resource
win10v2004-20241007-en
General
-
Target
1b2534124e710965155b5603b8856226b17188ec14cfb3094f9e35f2d2f25e46N.exe
-
Size
2.0MB
-
MD5
8382a7c86ff06e45eb4d2215885a2760
-
SHA1
014de9bbf29fef18dc660f85dca1aca07d1630f3
-
SHA256
1b2534124e710965155b5603b8856226b17188ec14cfb3094f9e35f2d2f25e46
-
SHA512
4631d3b43fc524e25dc32751290c5e897fdb074ebb70615a82434522b35ae19144c38bb58f1de84995bd88dd5c5c413e47533dac237601cddecad1421cdc16d5
-
SSDEEP
49152:ZQOavWHvEToeWC7ZdEWrsELqT/wcSNWbK1ah:ZLTHvEToeWELTWwb
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
resource yara_rule behavioral1/memory/1048-1-0x0000000001040000-0x0000000001248000-memory.dmp dcrat -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1048 1b2534124e710965155b5603b8856226b17188ec14cfb3094f9e35f2d2f25e46N.exe