General
-
Target
6e333e5b68668934186d53525c24d2ed857c35e36b4d21102d06e52e6890ac5f.exe
-
Size
2.7MB
-
Sample
250118-e4v63atlhk
-
MD5
9f7d0b9a32de0f6cefb6a3328f833034
-
SHA1
b2f45dab2c76093c317cab36a47873e55e2c7c6e
-
SHA256
6e333e5b68668934186d53525c24d2ed857c35e36b4d21102d06e52e6890ac5f
-
SHA512
0ead99e58a9d244f308405a1cff664479de57f1ee38014a557642ef1ea3fe52f20f433c17da565ea23168a8b8c416fcbcb43e6d3df0c959341d36f592fb97f1d
-
SSDEEP
49152:bBu+dK3GaaTUukCTXO2s2f1sKfmFRd0MdOa5k1kpm/Ufn6sC:duyjAi+j2aK+F54/U/6s
Behavioral task
behavioral1
Sample
6e333e5b68668934186d53525c24d2ed857c35e36b4d21102d06e52e6890ac5f.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6e333e5b68668934186d53525c24d2ed857c35e36b4d21102d06e52e6890ac5f.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
6e333e5b68668934186d53525c24d2ed857c35e36b4d21102d06e52e6890ac5f.exe
-
Size
2.7MB
-
MD5
9f7d0b9a32de0f6cefb6a3328f833034
-
SHA1
b2f45dab2c76093c317cab36a47873e55e2c7c6e
-
SHA256
6e333e5b68668934186d53525c24d2ed857c35e36b4d21102d06e52e6890ac5f
-
SHA512
0ead99e58a9d244f308405a1cff664479de57f1ee38014a557642ef1ea3fe52f20f433c17da565ea23168a8b8c416fcbcb43e6d3df0c959341d36f592fb97f1d
-
SSDEEP
49152:bBu+dK3GaaTUukCTXO2s2f1sKfmFRd0MdOa5k1kpm/Ufn6sC:duyjAi+j2aK+F54/U/6s
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1Scheduled Task
1