General
-
Target
f3b87a68e3780951dce0104da18f6e75c860c3aa830f9b4a0a4508ba75184c21
-
Size
2.7MB
-
Sample
250117-lzz3sasphm
-
MD5
974e955c30ae5c68c82af0fd2001c330
-
SHA1
f52e77c911f388ba9ec33a6f5c18450c440cfb52
-
SHA256
f3b87a68e3780951dce0104da18f6e75c860c3aa830f9b4a0a4508ba75184c21
-
SHA512
298319af2faf835ee81496c950e45f9e4ea70dbc9d7406c854dfa1a12411c0be6503ee9e9fca179ad035df2698877a2ed6458a1ad096fdf088b555227a711653
-
SSDEEP
49152:MDkZWCF2T8juUND4YQxZzfllulb0fnyN27mEGnjYEhQ+QK:t4CF2sjELplCbmyN27PxEhQ+
Behavioral task
behavioral1
Sample
f3b87a68e3780951dce0104da18f6e75c860c3aa830f9b4a0a4508ba75184c21.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f3b87a68e3780951dce0104da18f6e75c860c3aa830f9b4a0a4508ba75184c21.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
f3b87a68e3780951dce0104da18f6e75c860c3aa830f9b4a0a4508ba75184c21
-
Size
2.7MB
-
MD5
974e955c30ae5c68c82af0fd2001c330
-
SHA1
f52e77c911f388ba9ec33a6f5c18450c440cfb52
-
SHA256
f3b87a68e3780951dce0104da18f6e75c860c3aa830f9b4a0a4508ba75184c21
-
SHA512
298319af2faf835ee81496c950e45f9e4ea70dbc9d7406c854dfa1a12411c0be6503ee9e9fca179ad035df2698877a2ed6458a1ad096fdf088b555227a711653
-
SSDEEP
49152:MDkZWCF2T8juUND4YQxZzfllulb0fnyN27mEGnjYEhQ+QK:t4CF2sjELplCbmyN27PxEhQ+
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1Scheduled Task
1