General
-
Target
lsass.exe
-
Size
1.8MB
-
Sample
250107-dzfedaskat
-
MD5
11cca9e2c6dc9c2a728b89e7314ec26a
-
SHA1
58aec3b662a1c4e8b43cc454d90813ac89b5e612
-
SHA256
300072795259e7b2baa69a7a3d19ffea1844dffc391e710c654aa1b66b0e2197
-
SHA512
fb1fcff1c94e73b1227f65b237639e25604d614cfe365f2108bbbfdb489b97410fdc17411b8f00fc5b8f57d51080b4496010537a6a4ff9b15b7bdd24f89d0df7
-
SSDEEP
49152:IOZxI4F2vH8tr79p4MUm96NqpbJEQS8M0fPqnG9:IOZxI4Fftr79fkNqS07
Static task
static1
Behavioral task
behavioral1
Sample
lsass.exe
Resource
win10ltsc2021-20241211-en
Malware Config
Targets
-
-
Target
lsass.exe
-
Size
1.8MB
-
MD5
11cca9e2c6dc9c2a728b89e7314ec26a
-
SHA1
58aec3b662a1c4e8b43cc454d90813ac89b5e612
-
SHA256
300072795259e7b2baa69a7a3d19ffea1844dffc391e710c654aa1b66b0e2197
-
SHA512
fb1fcff1c94e73b1227f65b237639e25604d614cfe365f2108bbbfdb489b97410fdc17411b8f00fc5b8f57d51080b4496010537a6a4ff9b15b7bdd24f89d0df7
-
SSDEEP
49152:IOZxI4F2vH8tr79p4MUm96NqpbJEQS8M0fPqnG9:IOZxI4Fftr79fkNqS07
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-