General
-
Target
71f56f5e75963138d685df0663d07c63aece8753580f45c6e6682ee02dbb38b7.exe
-
Size
3.3MB
-
Sample
250116-xkghnstpht
-
MD5
51314ed425784c593487c9f42e5e967d
-
SHA1
4d9380fa7096f723d1262a95a945b75767dc24da
-
SHA256
71f56f5e75963138d685df0663d07c63aece8753580f45c6e6682ee02dbb38b7
-
SHA512
c6657db440033c8185977a0e4118cb006b24733ebc05feb41788cbe0762f1c3ce00b0bd34bcc57b4fa6dac67584a4b47c7a679e21a59116b88accfe28bf7978a
-
SSDEEP
49152:QwM0NUvaeipsEJpDidQ1fZVGsLaCE7tdTQDhqiZcqtN2Qys:QeNUVEHedQ1f7xadtdTOh+qP
Behavioral task
behavioral1
Sample
71f56f5e75963138d685df0663d07c63aece8753580f45c6e6682ee02dbb38b7.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
71f56f5e75963138d685df0663d07c63aece8753580f45c6e6682ee02dbb38b7.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
71f56f5e75963138d685df0663d07c63aece8753580f45c6e6682ee02dbb38b7.exe
-
Size
3.3MB
-
MD5
51314ed425784c593487c9f42e5e967d
-
SHA1
4d9380fa7096f723d1262a95a945b75767dc24da
-
SHA256
71f56f5e75963138d685df0663d07c63aece8753580f45c6e6682ee02dbb38b7
-
SHA512
c6657db440033c8185977a0e4118cb006b24733ebc05feb41788cbe0762f1c3ce00b0bd34bcc57b4fa6dac67584a4b47c7a679e21a59116b88accfe28bf7978a
-
SSDEEP
49152:QwM0NUvaeipsEJpDidQ1fZVGsLaCE7tdTQDhqiZcqtN2Qys:QeNUVEHedQ1f7xadtdTOh+qP
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Modifies WinLogon for persistence
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
4