General
-
Target
f6d9e0292d18f4cc7fde4f34bd9722276a570f94bd6586392bc94fc6380ec0daN.exe
-
Size
2.7MB
-
Sample
250116-g1zfesxlhn
-
MD5
7c935427ecd47e8deb5ce641226d8980
-
SHA1
963be2aa84776697aabe1e77d9b0596ba3ff0020
-
SHA256
f6d9e0292d18f4cc7fde4f34bd9722276a570f94bd6586392bc94fc6380ec0da
-
SHA512
1afb5e8f858b71fa3efdf0acfd38855d735b928388866e19396b86a874b69b45b00ebbdde233f4fddce2c04eb14acb137acf511e335d327aeb7f98f6d9ac27b2
-
SSDEEP
49152:5H3ow5/6oEcY2I6DxCP2vAWJ6ZsSVnJTXretG/Q1Hciyc5nIudabGm:5j/NDB9m2v9JqVJ7OG/Q18irfdabGm
Behavioral task
behavioral1
Sample
f6d9e0292d18f4cc7fde4f34bd9722276a570f94bd6586392bc94fc6380ec0daN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f6d9e0292d18f4cc7fde4f34bd9722276a570f94bd6586392bc94fc6380ec0daN.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
f6d9e0292d18f4cc7fde4f34bd9722276a570f94bd6586392bc94fc6380ec0daN.exe
-
Size
2.7MB
-
MD5
7c935427ecd47e8deb5ce641226d8980
-
SHA1
963be2aa84776697aabe1e77d9b0596ba3ff0020
-
SHA256
f6d9e0292d18f4cc7fde4f34bd9722276a570f94bd6586392bc94fc6380ec0da
-
SHA512
1afb5e8f858b71fa3efdf0acfd38855d735b928388866e19396b86a874b69b45b00ebbdde233f4fddce2c04eb14acb137acf511e335d327aeb7f98f6d9ac27b2
-
SSDEEP
49152:5H3ow5/6oEcY2I6DxCP2vAWJ6ZsSVnJTXretG/Q1Hciyc5nIudabGm:5j/NDB9m2v9JqVJ7OG/Q18irfdabGm
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1Scheduled Task
1