General
-
Target
ee66bca1ea767e827dfafd301d994e9afd36ff0fae546ad51e18347e999e9529N.exe
-
Size
1.2MB
-
Sample
241220-f9p3ns1kg1
-
MD5
bb7e3c97bc9136dd95203ac7b480b230
-
SHA1
55af32d959f455d87aec058789c35471272a34f2
-
SHA256
ee66bca1ea767e827dfafd301d994e9afd36ff0fae546ad51e18347e999e9529
-
SHA512
7cfe9fc9e23247ffd1f6d0fb7588af62c01f714d843e2268dab1442af2471e22559d1e41878bdcfb6796d6e572eda982c887160d20015a96e7c3a9c87ad1d77b
-
SSDEEP
24576:m5/FWj01uCUyGXFgSTq/kbe58fWj+1Ya:k/FG0Cpt4i28fWj+1Y
Behavioral task
behavioral1
Sample
ee66bca1ea767e827dfafd301d994e9afd36ff0fae546ad51e18347e999e9529N.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
ee66bca1ea767e827dfafd301d994e9afd36ff0fae546ad51e18347e999e9529N.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
ee66bca1ea767e827dfafd301d994e9afd36ff0fae546ad51e18347e999e9529N.exe
-
Size
1.2MB
-
MD5
bb7e3c97bc9136dd95203ac7b480b230
-
SHA1
55af32d959f455d87aec058789c35471272a34f2
-
SHA256
ee66bca1ea767e827dfafd301d994e9afd36ff0fae546ad51e18347e999e9529
-
SHA512
7cfe9fc9e23247ffd1f6d0fb7588af62c01f714d843e2268dab1442af2471e22559d1e41878bdcfb6796d6e572eda982c887160d20015a96e7c3a9c87ad1d77b
-
SSDEEP
24576:m5/FWj01uCUyGXFgSTq/kbe58fWj+1Ya:k/FG0Cpt4i28fWj+1Y
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Modifies WinLogon for persistence
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1