General
-
Target
iiu21398e8ydsa.exe
-
Size
1.7MB
-
Sample
250201-rwwtvayjhk
-
MD5
402413f48045d5217eb19c3ca703b3b9
-
SHA1
bcb9c54c86f677958d5acbd5d4cd5eb6de639340
-
SHA256
19b45d7e3ede011ff54ba5dc54705a38f030bfc70afc6dec3a5931f3f8d01a75
-
SHA512
c4fde3b1fbe2a98fa118f052cc668a6c5321cf8855d33e4b709c082ce086e6fd0e62872be056d8e3a4b73e0f7357e455cc3e7e053885e1404084b3628fda3811
-
SSDEEP
24576:U2G/nvxW3Ww0t60jeAbFDuiYq2hszeo9/gqHriQcU4bobxAgedn6CrRNe2ONaPx7:UbA3060jSReaNqLz4bifed6ERNFXx7
Behavioral task
behavioral1
Sample
iiu21398e8ydsa.exe
Resource
win10v2004-20250129-en
Malware Config
Targets
-
-
Target
iiu21398e8ydsa.exe
-
Size
1.7MB
-
MD5
402413f48045d5217eb19c3ca703b3b9
-
SHA1
bcb9c54c86f677958d5acbd5d4cd5eb6de639340
-
SHA256
19b45d7e3ede011ff54ba5dc54705a38f030bfc70afc6dec3a5931f3f8d01a75
-
SHA512
c4fde3b1fbe2a98fa118f052cc668a6c5321cf8855d33e4b709c082ce086e6fd0e62872be056d8e3a4b73e0f7357e455cc3e7e053885e1404084b3628fda3811
-
SSDEEP
24576:U2G/nvxW3Ww0t60jeAbFDuiYq2hszeo9/gqHriQcU4bobxAgedn6CrRNe2ONaPx7:UbA3060jSReaNqLz4bifed6ERNFXx7
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
UAC bypass
-
Disables Task Manager via registry modification
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Checks whether UAC is enabled
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
3