Analysis
-
max time kernel
93s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-12-2024 18:31
Behavioral task
behavioral1
Sample
DCRAT.exe
Resource
win7-20241010-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
DCRAT.exe
Resource
win10v2004-20241007-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
DCRAT.exe
-
Size
1.2MB
-
MD5
57a81d22ac81839a72406b2e0f6958b0
-
SHA1
d9fdd8baeda33e66c695b3404a3f1ac9860bcfc7
-
SHA256
b57a06999a93dd6493eec6a282134a6e7dcd07a7209020a35d6e848a094e79f7
-
SHA512
5f270ef607ee0c24fe8bb1b1a7fa0432ab5fd78d90414b91b8f1be57b68e139145bf5f56a4ab6cd552e5b88398c3bb5db3fa5b41e922e93c613fdd86dc19130c
-
SSDEEP
24576:QndjJct+y4641acJMHtWBhVeeGEP8L83+:1SaBNWQT8O
Score
10/10
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
resource yara_rule behavioral2/memory/4036-1-0x000001EDC8C50000-0x000001EDC8D8C000-memory.dmp dcrat -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4036 DCRAT.exe