General
-
Target
3f259715f8b59d89ac6b64384ca7083bd393d91e499f8e1252d284147a91021d
-
Size
2.7MB
-
Sample
250106-xx4tqsxjej
-
MD5
d553e626715bbdc6ef966fb1cbc7e0ce
-
SHA1
7dd91961404f829e09c288c7fccbc73867427677
-
SHA256
3f259715f8b59d89ac6b64384ca7083bd393d91e499f8e1252d284147a91021d
-
SHA512
478ab0da4b2f4cb11647783afed6bd52404fe2ddb198a5dc8de5846ec3406c6895365e13168fa9667c9af5c244fd772da1e716376eac656fdcb6836d74475d5a
-
SSDEEP
49152:MDkZWCF2T8juUND4YQxZzfllulb0fnyN27mEGnjYEhQ+QK:t4CF2sjELplCbmyN27PxEhQ+
Behavioral task
behavioral1
Sample
3f259715f8b59d89ac6b64384ca7083bd393d91e499f8e1252d284147a91021d.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
3f259715f8b59d89ac6b64384ca7083bd393d91e499f8e1252d284147a91021d.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
3f259715f8b59d89ac6b64384ca7083bd393d91e499f8e1252d284147a91021d
-
Size
2.7MB
-
MD5
d553e626715bbdc6ef966fb1cbc7e0ce
-
SHA1
7dd91961404f829e09c288c7fccbc73867427677
-
SHA256
3f259715f8b59d89ac6b64384ca7083bd393d91e499f8e1252d284147a91021d
-
SHA512
478ab0da4b2f4cb11647783afed6bd52404fe2ddb198a5dc8de5846ec3406c6895365e13168fa9667c9af5c244fd772da1e716376eac656fdcb6836d74475d5a
-
SSDEEP
49152:MDkZWCF2T8juUND4YQxZzfllulb0fnyN27mEGnjYEhQ+QK:t4CF2sjELplCbmyN27PxEhQ+
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1Scheduled Task
1