General
-
Target
CrackNursultan (2).exe
-
Size
2.1MB
-
Sample
250123-sl31vatmct
-
MD5
e9b8ce25037c26fe63171b24f06d04ec
-
SHA1
e33459bc02a1cd4824bb9f44c89b05dce7e20cec
-
SHA256
e7706dd5f9b91a20bc5881f9efd75af166942828a426879343df9454f767ece9
-
SHA512
ace3e8a023c6247b4e52cd09560c7c7f45af357dcaa14f26452741cddb2d09d94816b0e6bc79edefb03aa6e169385f0dfd039feba0e781a0e0884a3859100ef4
-
SSDEEP
24576:2TbBv5rUyXVs/ZFmQyOMPaRILC9j5oaKACNnAuuyGf2YnSeqjEwJdAXf0YaHssOq:IBJ8zAE9x5KNlueYSKdPNBp1rsvf
Static task
static1
Behavioral task
behavioral1
Sample
CrackNursultan (2).exe
Resource
win10ltsc2021-20250113-en
Malware Config
Targets
-
-
Target
CrackNursultan (2).exe
-
Size
2.1MB
-
MD5
e9b8ce25037c26fe63171b24f06d04ec
-
SHA1
e33459bc02a1cd4824bb9f44c89b05dce7e20cec
-
SHA256
e7706dd5f9b91a20bc5881f9efd75af166942828a426879343df9454f767ece9
-
SHA512
ace3e8a023c6247b4e52cd09560c7c7f45af357dcaa14f26452741cddb2d09d94816b0e6bc79edefb03aa6e169385f0dfd039feba0e781a0e0884a3859100ef4
-
SSDEEP
24576:2TbBv5rUyXVs/ZFmQyOMPaRILC9j5oaKACNnAuuyGf2YnSeqjEwJdAXf0YaHssOq:IBJ8zAE9x5KNlueYSKdPNBp1rsvf
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Modifies WinLogon for persistence
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1