General
-
Target
f516c6f52dece526d88114f3fd79d989dc4d9fd096d880fab7142ef5188ef1fe.exe
-
Size
2.7MB
-
Sample
250111-f25s6aymdk
-
MD5
917db17f1656134023dec1f54a66cfba
-
SHA1
7b060b95b3e9a5d86c7a7452e21c855c32ba3c13
-
SHA256
f516c6f52dece526d88114f3fd79d989dc4d9fd096d880fab7142ef5188ef1fe
-
SHA512
f9edae484f8d59202bb776a93b440a98aab9619f77464675d9d5e1e06d53fedf89c1aa4104b002312fe17081c7248837f2e002f7fe2e2509460a169174562207
-
SSDEEP
49152:MDkZWCF2T8juUND4YQxZzfllulb0fnyN27mEGnjYEhQ+QK3:t4CF2sjELplCbmyN27PxEhQ+h
Behavioral task
behavioral1
Sample
f516c6f52dece526d88114f3fd79d989dc4d9fd096d880fab7142ef5188ef1fe.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f516c6f52dece526d88114f3fd79d989dc4d9fd096d880fab7142ef5188ef1fe.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
f516c6f52dece526d88114f3fd79d989dc4d9fd096d880fab7142ef5188ef1fe.exe
-
Size
2.7MB
-
MD5
917db17f1656134023dec1f54a66cfba
-
SHA1
7b060b95b3e9a5d86c7a7452e21c855c32ba3c13
-
SHA256
f516c6f52dece526d88114f3fd79d989dc4d9fd096d880fab7142ef5188ef1fe
-
SHA512
f9edae484f8d59202bb776a93b440a98aab9619f77464675d9d5e1e06d53fedf89c1aa4104b002312fe17081c7248837f2e002f7fe2e2509460a169174562207
-
SSDEEP
49152:MDkZWCF2T8juUND4YQxZzfllulb0fnyN27mEGnjYEhQ+QK3:t4CF2sjELplCbmyN27PxEhQ+h
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1Scheduled Task
1