General
-
Target
6b9554367a439d39a00a0dff9a08b123.bin
-
Size
1.5MB
-
Sample
250113-bp7d1aymbz
-
MD5
be93a046d653237e3e9a7996f31b624a
-
SHA1
e0af016a1a9e9a6765a3c627042e42a4fa3e5400
-
SHA256
11d8980ca6e1f41a7ede9bf1aca61638bbf024ac1a38eb4b0424f6dbc79d991d
-
SHA512
77c1e39aad69fe1d46568259320ddada0f87fa70aed7b157f27c578e67b541745992b667cda3646f385d06cdf8faf798b03d5867a2d8c407fc5c0c9b57df3650
-
SSDEEP
24576:XpoSrzxYXOWvIzPP/Va6RlRfFjCvZKwzQWYyl1jxJU1Sc7wAna9xF6mUdo6u81jC:XpnXyTgjnVa6Rlnwzt/1A1SL45u3Y7K
Static task
static1
Behavioral task
behavioral1
Sample
3332277b9e53375e998ccf981cdb0519fea7721b5e79a3d7a60b83f448f6c0a9.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3332277b9e53375e998ccf981cdb0519fea7721b5e79a3d7a60b83f448f6c0a9.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
3332277b9e53375e998ccf981cdb0519fea7721b5e79a3d7a60b83f448f6c0a9.exe
-
Size
1.9MB
-
MD5
6b9554367a439d39a00a0dff9a08b123
-
SHA1
e1d22cde90c297c10f4fcba5b3980e5d551eb0b3
-
SHA256
3332277b9e53375e998ccf981cdb0519fea7721b5e79a3d7a60b83f448f6c0a9
-
SHA512
72ffbca1a2aa7cd2bb6b963d97b43d7d5eab9a11d09c647c7679e71877927b8c021e28cd1e28ae9ac5300c8621ba97aae6699e1abddc58be89c9bb3e84d1c720
-
SSDEEP
49152:xh0kcmcdp/caMMlawkBXRInaKYRouPbWGQ2:xhbcmcfM/N1RSavoujWH
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Modifies WinLogon for persistence
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1