General
-
Target
92d29106be881759ef6f045a3415137d.bin
-
Size
1.7MB
-
Sample
250113-byb98ayqds
-
MD5
7d1c1203f4d144e2c9f9b482ef23b0b3
-
SHA1
e012a5ac7c0389d95f3dc6d429f6ee30f2c3e754
-
SHA256
88414350df955ae0d1c3e062ee97a4da79361ec71711c4c40273fa70a4ccce53
-
SHA512
618802b02a48189ae431771abe8bae23f2b3da9fea0dbf7b3a8791f35521d81103e063f05eb2053de77fc38d3bdb82b9790c0830c3df06e430878fc3d723b81a
-
SSDEEP
49152:aYJzXjLQWhHtuMr+HwdTPVpQXpS8CzydgVV+ty:a0bvN5BpypUC0V+E
Static task
static1
Behavioral task
behavioral1
Sample
b1996319c3b0fafa04179dd7b7de47c74be2dc3dc0d6aa04030b645970e1a9b0.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
b1996319c3b0fafa04179dd7b7de47c74be2dc3dc0d6aa04030b645970e1a9b0.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
b1996319c3b0fafa04179dd7b7de47c74be2dc3dc0d6aa04030b645970e1a9b0.exe
-
Size
2.2MB
-
MD5
92d29106be881759ef6f045a3415137d
-
SHA1
9b307b4b98851c4325a1f2746c7827a0d14c7e36
-
SHA256
b1996319c3b0fafa04179dd7b7de47c74be2dc3dc0d6aa04030b645970e1a9b0
-
SHA512
43b526bd521ac72688dc7670c9c9ce323b39675620a0bf202d783906ac650fdc1bbefeb5876f97c5fcf525e6c5d39cc4b29ffd43acd4560baf0745126c5eec8e
-
SSDEEP
49152:IBJ+h0kcmcdp/caMMlawkBXRInaKYRouPbWGQ2L:yQhbcmcfM/N1RSavoujWHk
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Modifies WinLogon for persistence
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1