General
-
Target
swift.rar
-
Size
1.5MB
-
Sample
250124-k536yssldm
-
MD5
dc8866f626aae39102d5a0dce1b3695b
-
SHA1
37ab0eb8b17d327d47ebfa729dd52d4f409ecbf9
-
SHA256
5a4bcc6593834b5aa0fd5ef8f9a755b78ba98492249c66dddfc2e77f1cdb0ce2
-
SHA512
08df2db96955f719eb50e75c45e97d30e073011efa05db9d6220a8a16e283ef17efb2eb2bdaf22878d3c96e20ac00d10a8c729ec98c420bbbcee498cf15efcab
-
SSDEEP
24576:tvHXV3VDGkfPggkNC2c2QNFvkLPQOA92+aBO6drLPMFdzXf8nU9aLSbQPZzARHJ6:1XVFBL2KFcLPJU2+idBLaDlqlPN2XcV
Static task
static1
Behavioral task
behavioral1
Sample
swift.rar
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
swift.rar
-
Size
1.5MB
-
MD5
dc8866f626aae39102d5a0dce1b3695b
-
SHA1
37ab0eb8b17d327d47ebfa729dd52d4f409ecbf9
-
SHA256
5a4bcc6593834b5aa0fd5ef8f9a755b78ba98492249c66dddfc2e77f1cdb0ce2
-
SHA512
08df2db96955f719eb50e75c45e97d30e073011efa05db9d6220a8a16e283ef17efb2eb2bdaf22878d3c96e20ac00d10a8c729ec98c420bbbcee498cf15efcab
-
SSDEEP
24576:tvHXV3VDGkfPggkNC2c2QNFvkLPQOA92+aBO6drLPMFdzXf8nU9aLSbQPZzARHJ6:1XVFBL2KFcLPJU2+idBLaDlqlPN2XcV
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
UAC bypass
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Checks whether UAC is enabled
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
2