General
-
Target
01ef75f76ae452476b1de15a3238617f33c4b685e5bb423de49f34f44b0a0111.zip
-
Size
987KB
-
Sample
241222-229m1a1qgp
-
MD5
3f7f04c8e01e4f49e9c0528bb76b9ac1
-
SHA1
2eeb08c7d5e304ce34b497c1f7fdc64356737a01
-
SHA256
8050f43862d93cfd709af334580335f642705ae15b4daaf16199bdc3a9ca037b
-
SHA512
5b5ed6f45ffce298ef1461784fa7db45e3af73c29ae207c353eb5eb4f9c1a648991e7ed6d6d17f6cf8365a6a2d62180dc88bbd66bcf2dbd4850997d0b79f5ac2
-
SSDEEP
24576:gshltUgLsknrnjSPHW7x4cag6CYnPfLFP/pbvtHAnXgOBVniiDj:p7UgYkrOixNN+PfZpUFNFDj
Behavioral task
behavioral1
Sample
01ef75f76ae452476b1de15a3238617f33c4b685e5bb423de49f34f44b0a0111.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
01ef75f76ae452476b1de15a3238617f33c4b685e5bb423de49f34f44b0a0111.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
01ef75f76ae452476b1de15a3238617f33c4b685e5bb423de49f34f44b0a0111.exe
-
Size
1.4MB
-
MD5
13aeda86aafde4051d7ca9280dac9a67
-
SHA1
fd4a6168c79c28d6e25be7c799ffd25c2dbd69d0
-
SHA256
01ef75f76ae452476b1de15a3238617f33c4b685e5bb423de49f34f44b0a0111
-
SHA512
ddfc9a2a5a2f3b83023eecf4053de1930ebf9486d1cff869ab6d2199c5978926b2c4a6468358c627f4cff16a235c8d23b98711d8b3bf608ed03f4e4d7d7d0194
-
SSDEEP
24576:Lw/d/t+9SDGMoRNkj63uYnqzW1yqCc/CfVsdEYXHo1o9edFt4k:M/d/HP6+Ynb18Kfdx3IoIt
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Modifies WinLogon for persistence
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1