General
-
Target
b49adf276a5e055ef1a3685f032701b41be76177f7f9eb85dfac2d33b5fa7c9f.exe
-
Size
911KB
-
Sample
250129-dsc1nsyrcw
-
MD5
082141e65f26ececc48552790d6c6da4
-
SHA1
fba9667158632e2dbfa128d1fa1bd4be282e773a
-
SHA256
b49adf276a5e055ef1a3685f032701b41be76177f7f9eb85dfac2d33b5fa7c9f
-
SHA512
cbe0fef685801d436b5637a0e08df052af119284491a382d689686735ee8352d3edaa6857754f16f022a0bb43f95039bc841e4ed1e20614ea0a9976258947946
-
SSDEEP
12288:pTHSOOJVu1SNEC8m+P1BAyrQ/ta3iruJtDwbWn9N:lnOJVrj8m+aSDwbA9N
Behavioral task
behavioral1
Sample
b49adf276a5e055ef1a3685f032701b41be76177f7f9eb85dfac2d33b5fa7c9f.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b49adf276a5e055ef1a3685f032701b41be76177f7f9eb85dfac2d33b5fa7c9f.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
b49adf276a5e055ef1a3685f032701b41be76177f7f9eb85dfac2d33b5fa7c9f.exe
-
Size
911KB
-
MD5
082141e65f26ececc48552790d6c6da4
-
SHA1
fba9667158632e2dbfa128d1fa1bd4be282e773a
-
SHA256
b49adf276a5e055ef1a3685f032701b41be76177f7f9eb85dfac2d33b5fa7c9f
-
SHA512
cbe0fef685801d436b5637a0e08df052af119284491a382d689686735ee8352d3edaa6857754f16f022a0bb43f95039bc841e4ed1e20614ea0a9976258947946
-
SSDEEP
12288:pTHSOOJVu1SNEC8m+P1BAyrQ/ta3iruJtDwbWn9N:lnOJVrj8m+aSDwbA9N
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
UAC bypass
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Checks whether UAC is enabled
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1Scheduled Task
1