Overview
overview
10Static
static
10d49f9a9a6f...5a.exe
windows7-x64
10d49f9a9a6f...5a.exe
windows10-2004-x64
10d49f9a9a6f...5a.exe
android-9-x86
d49f9a9a6f...5a.exe
android-10-x64
d49f9a9a6f...5a.exe
android-11-x64
d49f9a9a6f...5a.exe
macos-10.15-amd64
d49f9a9a6f...5a.exe
ubuntu-18.04-amd64
d49f9a9a6f...5a.exe
debian-9-armhf
d49f9a9a6f...5a.exe
debian-9-mips
d49f9a9a6f...5a.exe
debian-9-mipsel
General
-
Target
d49f9a9a6f4d5c60ae2c35aafe7d105a.exe
-
Size
4.2MB
-
Sample
250113-etqtlaxqfm
-
MD5
d49f9a9a6f4d5c60ae2c35aafe7d105a
-
SHA1
8a192f01c06d2b67437c8789bdf564864d11eefc
-
SHA256
91a5d06a6ddc1dbc0d573871082b21c0ef5d260987d760bff9b1d19966d0c32d
-
SHA512
fc90ac8848cbc7231bbe6d1c4e974f375d5af137a157d2553e516059270748f5162c1ea51f282850d4572eef6956fc8e6e9cead1a105286c712251ff43d1a440
-
SSDEEP
98304:hbE+vSZLE4Cj/L7gHNchtcv4zTk24eDeRRXcaiJ:hw+KL6fwscQTk24eWRXhY
Behavioral task
behavioral1
Sample
d49f9a9a6f4d5c60ae2c35aafe7d105a.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
d49f9a9a6f4d5c60ae2c35aafe7d105a.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
d49f9a9a6f4d5c60ae2c35aafe7d105a.exe
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral4
Sample
d49f9a9a6f4d5c60ae2c35aafe7d105a.exe
Resource
android-x64-20240624-en
Behavioral task
behavioral5
Sample
d49f9a9a6f4d5c60ae2c35aafe7d105a.exe
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral6
Sample
d49f9a9a6f4d5c60ae2c35aafe7d105a.exe
Resource
macos-20241106-en
Behavioral task
behavioral7
Sample
d49f9a9a6f4d5c60ae2c35aafe7d105a.exe
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral8
Sample
d49f9a9a6f4d5c60ae2c35aafe7d105a.exe
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral9
Sample
d49f9a9a6f4d5c60ae2c35aafe7d105a.exe
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral10
Sample
d49f9a9a6f4d5c60ae2c35aafe7d105a.exe
Resource
debian9-mipsel-20240418-en
Malware Config
Targets
-
-
Target
d49f9a9a6f4d5c60ae2c35aafe7d105a.exe
-
Size
4.2MB
-
MD5
d49f9a9a6f4d5c60ae2c35aafe7d105a
-
SHA1
8a192f01c06d2b67437c8789bdf564864d11eefc
-
SHA256
91a5d06a6ddc1dbc0d573871082b21c0ef5d260987d760bff9b1d19966d0c32d
-
SHA512
fc90ac8848cbc7231bbe6d1c4e974f375d5af137a157d2553e516059270748f5162c1ea51f282850d4572eef6956fc8e6e9cead1a105286c712251ff43d1a440
-
SSDEEP
98304:hbE+vSZLE4Cj/L7gHNchtcv4zTk24eDeRRXcaiJ:hw+KL6fwscQTk24eWRXhY
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Disables Task Manager via registry modification
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
3