General
-
Target
56e3e8a3c813bd8b6f1902919358ffe240f0d2cafea63957bf5ba515d732f937N.exe
-
Size
1.7MB
-
Sample
250112-llm63awrg1
-
MD5
68299bd69adfdcc262617c6478268f90
-
SHA1
1e8608d43b9d7dc8eeb75a27aa53a33113114987
-
SHA256
56e3e8a3c813bd8b6f1902919358ffe240f0d2cafea63957bf5ba515d732f937
-
SHA512
edc172e5f16608210cbbc519a0cad465b559dc59293ed227649bf4da004491f68dcb23834f0528c5e9c8e6fffb70f682675207114fd513b8a84433154f0664af
-
SSDEEP
24576:N3QwuLyEbVoCtPreIjNLoN/VNGeSQDx1m17zezKOkCzeJGFUJ:NgwuuEpdDLNwVMeXDL0fdSzAG
Behavioral task
behavioral1
Sample
56e3e8a3c813bd8b6f1902919358ffe240f0d2cafea63957bf5ba515d732f937N.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
56e3e8a3c813bd8b6f1902919358ffe240f0d2cafea63957bf5ba515d732f937N.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
56e3e8a3c813bd8b6f1902919358ffe240f0d2cafea63957bf5ba515d732f937N.exe
-
Size
1.7MB
-
MD5
68299bd69adfdcc262617c6478268f90
-
SHA1
1e8608d43b9d7dc8eeb75a27aa53a33113114987
-
SHA256
56e3e8a3c813bd8b6f1902919358ffe240f0d2cafea63957bf5ba515d732f937
-
SHA512
edc172e5f16608210cbbc519a0cad465b559dc59293ed227649bf4da004491f68dcb23834f0528c5e9c8e6fffb70f682675207114fd513b8a84433154f0664af
-
SSDEEP
24576:N3QwuLyEbVoCtPreIjNLoN/VNGeSQDx1m17zezKOkCzeJGFUJ:NgwuuEpdDLNwVMeXDL0fdSzAG
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Drops file in System32 directory
-