General
-
Target
caf3aedf8d9e38c09ba4368107b617451b25889fa4f26218e2c27090e8ea8ae5.exe
-
Size
1.8MB
-
Sample
241222-rvq7za1pfp
-
MD5
5a226562cbae5759a91657b795290183
-
SHA1
c04ac12b8b3f5d82848f001629ce9f7d79ea0acd
-
SHA256
caf3aedf8d9e38c09ba4368107b617451b25889fa4f26218e2c27090e8ea8ae5
-
SHA512
5d3722efd71281f0b6588ae318b667fb015a7f0cd8969a8e7b2bceb6025531d277fe6ec629433fbc365d4ef10dc98eca3be1e1c4a3656236a0c3d93df5bbb818
-
SSDEEP
24576:DhjQ5we0Q2YfXWE/vnH4F64+u+a2Y/ROC8vddNbRhr5Cv+ST:DhjI0WXxnH+64+tUROCuHbPcz
Behavioral task
behavioral1
Sample
caf3aedf8d9e38c09ba4368107b617451b25889fa4f26218e2c27090e8ea8ae5.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
caf3aedf8d9e38c09ba4368107b617451b25889fa4f26218e2c27090e8ea8ae5.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
caf3aedf8d9e38c09ba4368107b617451b25889fa4f26218e2c27090e8ea8ae5.exe
-
Size
1.8MB
-
MD5
5a226562cbae5759a91657b795290183
-
SHA1
c04ac12b8b3f5d82848f001629ce9f7d79ea0acd
-
SHA256
caf3aedf8d9e38c09ba4368107b617451b25889fa4f26218e2c27090e8ea8ae5
-
SHA512
5d3722efd71281f0b6588ae318b667fb015a7f0cd8969a8e7b2bceb6025531d277fe6ec629433fbc365d4ef10dc98eca3be1e1c4a3656236a0c3d93df5bbb818
-
SSDEEP
24576:DhjQ5we0Q2YfXWE/vnH4F64+u+a2Y/ROC8vddNbRhr5Cv+ST:DhjI0WXxnH+64+tUROCuHbPcz
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1Scheduled Task
1