General
-
Target
PyDec.zip
-
Size
279KB
-
Sample
241222-twy1batjgs
-
MD5
cdd0900edeedfc6ecf4cbde8e84dd0dd
-
SHA1
3b4c43a23e3f759d3dfa21eb3a5f2bf52493f254
-
SHA256
f00bc957948a4acb2b43a65702e34de767ad8cdf7efefea11e4f57a039ad5bcc
-
SHA512
a0fbfea4ed19c61795f2e86007744b5e02c6e783a99cd395046f7de27ccc74ca8c824cb121479ebb22d4ff7e4cb43aae1639ac9bd0cc8ef422a759339582f6a5
-
SSDEEP
6144:kYKEiGGFCPWd83uUeRlKeg8/KZ7h2AVB4+VI+xZ77:BfGMPHuVlKnZ12ATVjN
Static task
static1
Behavioral task
behavioral1
Sample
PyDec.zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
PyDec.zip
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
PyDec.zip
-
Size
279KB
-
MD5
cdd0900edeedfc6ecf4cbde8e84dd0dd
-
SHA1
3b4c43a23e3f759d3dfa21eb3a5f2bf52493f254
-
SHA256
f00bc957948a4acb2b43a65702e34de767ad8cdf7efefea11e4f57a039ad5bcc
-
SHA512
a0fbfea4ed19c61795f2e86007744b5e02c6e783a99cd395046f7de27ccc74ca8c824cb121479ebb22d4ff7e4cb43aae1639ac9bd0cc8ef422a759339582f6a5
-
SSDEEP
6144:kYKEiGGFCPWd83uUeRlKeg8/KZ7h2AVB4+VI+xZ77:BfGMPHuVlKnZ12ATVjN
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s)
-