General
-
Target
Dcrat (123).zip
-
Size
19.3MB
-
Sample
250114-2mybesskb1
-
MD5
ada95e6c53495d51f34c6d72fc307d2b
-
SHA1
757911647698aa230384eb959d3a8f21b2e294f1
-
SHA256
dce5f8b5b180084796a8f8d7cfb22d112ae3694fb649649543ad8b3ba2e8e37c
-
SHA512
4b7dea50882c870b4581f3a57b043b9c567b52592ff430dc26fa58eb1ba1c43f18d1b59bc2dd6e353c950be8f570a1a88e46b8ec4fa6988e7831a22a403013aa
-
SSDEEP
393216:C6gw5Z8d2wavvVtMPKwkMbpQjC/yTQAToEY6fmpEW+fz4wbMy:xo4vASwkMbpQjXTZYAmpj+rDbMy
Behavioral task
behavioral1
Sample
Dcrat (123).zip
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
Dcrat (123).zip
-
Size
19.3MB
-
MD5
ada95e6c53495d51f34c6d72fc307d2b
-
SHA1
757911647698aa230384eb959d3a8f21b2e294f1
-
SHA256
dce5f8b5b180084796a8f8d7cfb22d112ae3694fb649649543ad8b3ba2e8e37c
-
SHA512
4b7dea50882c870b4581f3a57b043b9c567b52592ff430dc26fa58eb1ba1c43f18d1b59bc2dd6e353c950be8f570a1a88e46b8ec4fa6988e7831a22a403013aa
-
SSDEEP
393216:C6gw5Z8d2wavvVtMPKwkMbpQjC/yTQAToEY6fmpEW+fz4wbMy:xo4vASwkMbpQjXTZYAmpj+rDbMy
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1