General
-
Target
3614F4C4B137E627F03D0118F4779D52.exe
-
Size
1.8MB
-
Sample
250111-rbjc1s1jfs
-
MD5
3614f4c4b137e627f03d0118f4779d52
-
SHA1
07120124f394eddb46c3c2a985063718d17fc48d
-
SHA256
4acc21ce239f8eadca573c53b92cc49b96a9d7b96f7cfe4a5511847148839a2a
-
SHA512
bfc1cb74b69f1bc0e47eefee7614760edfe068ac9471ed211a87d4b1a47f8f2e784db2beb79b23988ba7810d525eb2463f75eacf0df9f560a2d2e0e52a0e7c7f
-
SSDEEP
24576:wwkCsYsgFFuqj/oBxyALwMosh651ZBvISmXqD0Z+rtyumwwI3PXGSfaeiLUb+7xE:B5kBTXYD3Yo0ZKy7IfXGfLU67x6sg
Static task
static1
Behavioral task
behavioral1
Sample
3614F4C4B137E627F03D0118F4779D52.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3614F4C4B137E627F03D0118F4779D52.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
3614F4C4B137E627F03D0118F4779D52.exe
-
Size
1.8MB
-
MD5
3614f4c4b137e627f03d0118f4779d52
-
SHA1
07120124f394eddb46c3c2a985063718d17fc48d
-
SHA256
4acc21ce239f8eadca573c53b92cc49b96a9d7b96f7cfe4a5511847148839a2a
-
SHA512
bfc1cb74b69f1bc0e47eefee7614760edfe068ac9471ed211a87d4b1a47f8f2e784db2beb79b23988ba7810d525eb2463f75eacf0df9f560a2d2e0e52a0e7c7f
-
SSDEEP
24576:wwkCsYsgFFuqj/oBxyALwMosh651ZBvISmXqD0Z+rtyumwwI3PXGSfaeiLUb+7xE:B5kBTXYD3Yo0ZKy7IfXGfLU67x6sg
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Modifies WinLogon for persistence
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Modify Registry
3Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1