General
-
Target
findme.exe
-
Size
3.2MB
-
Sample
250113-ny1c9s1lax
-
MD5
4fabffd3dfad2d1e11ae2317b40b6e4a
-
SHA1
df2ce294dc75060632bfb45add20e69ccc9396c1
-
SHA256
079172ddcc7b1086b9bf972b21d0d579dbff695fde14811165a986efe322873a
-
SHA512
bc6ab0e0286913472d6ca8cd19e95b4066d433fbb6247ed377e6ade995a74c201902c32463361e9d9746277fe8898d95b8a08114eedc027f062b38d4ea9550ed
-
SSDEEP
49152:ubA3jIe1fNayqo7lKdSD6qVvWakQ4BnFxFkUP6IqG7bZ0Z2lOWvOhvECUQb:ubQNuAD3vyQ9bLG7yglVv4vHUy
Behavioral task
behavioral1
Sample
findme.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
findme.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
findme.exe
-
Size
3.2MB
-
MD5
4fabffd3dfad2d1e11ae2317b40b6e4a
-
SHA1
df2ce294dc75060632bfb45add20e69ccc9396c1
-
SHA256
079172ddcc7b1086b9bf972b21d0d579dbff695fde14811165a986efe322873a
-
SHA512
bc6ab0e0286913472d6ca8cd19e95b4066d433fbb6247ed377e6ade995a74c201902c32463361e9d9746277fe8898d95b8a08114eedc027f062b38d4ea9550ed
-
SSDEEP
49152:ubA3jIe1fNayqo7lKdSD6qVvWakQ4BnFxFkUP6IqG7bZ0Z2lOWvOhvECUQb:ubQNuAD3vyQ9bLG7yglVv4vHUy
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1