General
-
Target
881eac6d797de5eb61cc9cf2ec14ba9ef671a6aa73042edc0ada37a6b6f961a7N.exe
-
Size
1.8MB
-
Sample
241222-qtwkmazqhl
-
MD5
9e61b13dd0c31b6ee4f6e25df047a4a0
-
SHA1
46f33b5a24f045c877e2192c7535f529853336af
-
SHA256
881eac6d797de5eb61cc9cf2ec14ba9ef671a6aa73042edc0ada37a6b6f961a7
-
SHA512
921ecaf3926ebec12ae5d52599713d864fb5b5fcf9505f66038ab7694be71068f4ce825be2bd816a876450a790c12e42c074485cfe67aae2ce88d4b868ee1208
-
SSDEEP
24576:DhjQ5we0Q2YfXWE/vnH4F64+u+a2Y/ROC8vddNbRhr5Cv+S:DhjI0WXxnH+64+tUROCuHbPc
Behavioral task
behavioral1
Sample
881eac6d797de5eb61cc9cf2ec14ba9ef671a6aa73042edc0ada37a6b6f961a7N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
881eac6d797de5eb61cc9cf2ec14ba9ef671a6aa73042edc0ada37a6b6f961a7N.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
881eac6d797de5eb61cc9cf2ec14ba9ef671a6aa73042edc0ada37a6b6f961a7N.exe
-
Size
1.8MB
-
MD5
9e61b13dd0c31b6ee4f6e25df047a4a0
-
SHA1
46f33b5a24f045c877e2192c7535f529853336af
-
SHA256
881eac6d797de5eb61cc9cf2ec14ba9ef671a6aa73042edc0ada37a6b6f961a7
-
SHA512
921ecaf3926ebec12ae5d52599713d864fb5b5fcf9505f66038ab7694be71068f4ce825be2bd816a876450a790c12e42c074485cfe67aae2ce88d4b868ee1208
-
SSDEEP
24576:DhjQ5we0Q2YfXWE/vnH4F64+u+a2Y/ROC8vddNbRhr5Cv+S:DhjI0WXxnH+64+tUROCuHbPc
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1Scheduled Task
1