Overview
overview
10Static
static
10183CB9283D...3C.exe
windows7-x64
10183CB9283D...3C.exe
windows10-2004-x64
10183CB9283D...3C.exe
android-9-x86
183CB9283D...3C.exe
android-10-x64
183CB9283D...3C.exe
android-11-x64
183CB9283D...3C.exe
macos-10.15-amd64
183CB9283D...3C.exe
ubuntu-18.04-amd64
183CB9283D...3C.exe
debian-9-armhf
183CB9283D...3C.exe
debian-9-mips
183CB9283D...3C.exe
debian-9-mipsel
General
-
Target
183CB9283D9C8F6282283BD39F49D33C.exe
-
Size
2.7MB
-
Sample
250113-f6xncaxraw
-
MD5
183cb9283d9c8f6282283bd39f49d33c
-
SHA1
76674564064d31bb9d37f802bdec3821d4a55d89
-
SHA256
d169e5e99edef6f5c3619faee33bddd20978f514bdc3448b8655fd06ea5f5984
-
SHA512
14a40235310755e00bfa58a5169978b7fe40890e2f1149500f77780b82ef1aed1354daafb149de18deb3690bbc1b4f6e885be988e4163b6e3acdd16c30d28e22
-
SSDEEP
49152:Bfj5Pkja3lMPnl9LS7y5PEeQxtD5vLyCse5EPUC1SKGLFSjvzbN+/rV:BfBkyqPnDSOdEeQfocN8GLQLkz
Behavioral task
behavioral1
Sample
183CB9283D9C8F6282283BD39F49D33C.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
183CB9283D9C8F6282283BD39F49D33C.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
183CB9283D9C8F6282283BD39F49D33C.exe
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral4
Sample
183CB9283D9C8F6282283BD39F49D33C.exe
Resource
android-x64-20240910-en
Behavioral task
behavioral5
Sample
183CB9283D9C8F6282283BD39F49D33C.exe
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral6
Sample
183CB9283D9C8F6282283BD39F49D33C.exe
Resource
macos-20241101-en
Behavioral task
behavioral7
Sample
183CB9283D9C8F6282283BD39F49D33C.exe
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral8
Sample
183CB9283D9C8F6282283BD39F49D33C.exe
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral9
Sample
183CB9283D9C8F6282283BD39F49D33C.exe
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral10
Sample
183CB9283D9C8F6282283BD39F49D33C.exe
Resource
debian9-mipsel-20240226-en
Malware Config
Targets
-
-
Target
183CB9283D9C8F6282283BD39F49D33C.exe
-
Size
2.7MB
-
MD5
183cb9283d9c8f6282283bd39f49d33c
-
SHA1
76674564064d31bb9d37f802bdec3821d4a55d89
-
SHA256
d169e5e99edef6f5c3619faee33bddd20978f514bdc3448b8655fd06ea5f5984
-
SHA512
14a40235310755e00bfa58a5169978b7fe40890e2f1149500f77780b82ef1aed1354daafb149de18deb3690bbc1b4f6e885be988e4163b6e3acdd16c30d28e22
-
SSDEEP
49152:Bfj5Pkja3lMPnl9LS7y5PEeQxtD5vLyCse5EPUC1SKGLFSjvzbN+/rV:BfBkyqPnDSOdEeQfocN8GLQLkz
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
2