Analysis
-
max time kernel
94s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-12-2024 20:08
Behavioral task
behavioral1
Sample
88a95bca93c208158387f1d1fdf2652cb6be4561631ec0d22266c6b6de73c8fb.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
88a95bca93c208158387f1d1fdf2652cb6be4561631ec0d22266c6b6de73c8fb.exe
Resource
win10v2004-20241007-en
General
-
Target
88a95bca93c208158387f1d1fdf2652cb6be4561631ec0d22266c6b6de73c8fb.exe
-
Size
2.0MB
-
MD5
c2fdf9223423936622f8d548c58767ab
-
SHA1
b9741b8b531adf6ccbe8dc4df93cd4881587d109
-
SHA256
88a95bca93c208158387f1d1fdf2652cb6be4561631ec0d22266c6b6de73c8fb
-
SHA512
a47256bdc8b5d90bca69e52dc09294c444135ee6a0345c6e6d87e1f2774352d428c745520a2a2525c081fdda58335d9c3187b0102d665992601749c137393541
-
SSDEEP
49152:ZQOavWHvEToeWC7ZdEWrsELqT/wcSNWbK1ahv:ZLTHvEToeWELTWwb4
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
resource yara_rule behavioral2/memory/1948-1-0x00000000006D0000-0x00000000008D8000-memory.dmp dcrat -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1948 88a95bca93c208158387f1d1fdf2652cb6be4561631ec0d22266c6b6de73c8fb.exe