General
-
Target
5d232371c6b04bf6e609ee14fc06f3f6.bin
-
Size
1.4MB
-
Sample
250107-blmkesxjew
-
MD5
c519741bd97e918a01b75e29682fdef6
-
SHA1
b732fa3317e33b5c93c27816cca3362ed9ffb316
-
SHA256
dbe0a12ddd61fa89d149ddc5fac4cf9cfec85fc64e7f29459d9c88049af8a0de
-
SHA512
c505208fe042cbe7287e6a79cdb47841eb0a252b5c64f0ddbba1b50a204c52794ff89e2f79335f41c704f56134cb346d1ca1dccbc17dd81981447923fca0334f
-
SSDEEP
24576:nq0qRt14pFzkiqcgqB+6CP3sYcn41jteMRQwJLig/IREhldJpb:njG1IzkZi+6qZc4Te5wJLiNSPR
Behavioral task
behavioral1
Sample
05c4814add59df3a27d840a1494002ac0b0e49aa9348229bd9f438d87e3e56c1.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
05c4814add59df3a27d840a1494002ac0b0e49aa9348229bd9f438d87e3e56c1.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
05c4814add59df3a27d840a1494002ac0b0e49aa9348229bd9f438d87e3e56c1.exe
-
Size
1.8MB
-
MD5
5d232371c6b04bf6e609ee14fc06f3f6
-
SHA1
d6b7e0e98b0bd964ce6b2256f7c3f52ea2ec39ba
-
SHA256
05c4814add59df3a27d840a1494002ac0b0e49aa9348229bd9f438d87e3e56c1
-
SHA512
18b7ae05853bbe0109b3f00861b97951a7963036bbe021b3a2ae178c810257033e249613e522c3a4c16ceaa415f3358b8a052c28f321c6128228f38367991cc6
-
SSDEEP
49152:DT+08U5LLZTm94oY5RMRyAhpXDQt1UJo:DT8EL4I5EfG
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1Scheduled Task
1