General
-
Target
F868DDCB54E0C6AC37B4F7858D871083.exe
-
Size
737KB
-
Sample
250201-sj8hjszkaj
-
MD5
f868ddcb54e0c6ac37b4f7858d871083
-
SHA1
996f978b1498c8fd01ec1caa5a35e202545b4e14
-
SHA256
519bcb8d930b658fa5d0b975c7f74efd297e37c2067753b2020f09147fe86cfa
-
SHA512
bfd37ab7cf85c1a75c9ab81333ccdc0d9583433002cb2866831e4dba617f1adeb0d735e86179e0302ab02afd4dda7349252529ef8ce255687644f3b7a1aef62c
-
SSDEEP
12288:sRTnNNfL/Yr2kNnmSHJJMA+HCpW3Ari4VVyZC0+1cqwwZ6:sRTnfYTmSpJMA+i3iE0nq/6
Behavioral task
behavioral1
Sample
F868DDCB54E0C6AC37B4F7858D871083.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
F868DDCB54E0C6AC37B4F7858D871083.exe
-
Size
737KB
-
MD5
f868ddcb54e0c6ac37b4f7858d871083
-
SHA1
996f978b1498c8fd01ec1caa5a35e202545b4e14
-
SHA256
519bcb8d930b658fa5d0b975c7f74efd297e37c2067753b2020f09147fe86cfa
-
SHA512
bfd37ab7cf85c1a75c9ab81333ccdc0d9583433002cb2866831e4dba617f1adeb0d735e86179e0302ab02afd4dda7349252529ef8ce255687644f3b7a1aef62c
-
SSDEEP
12288:sRTnNNfL/Yr2kNnmSHJJMA+HCpW3Ari4VVyZC0+1cqwwZ6:sRTnfYTmSpJMA+i3iE0nq/6
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
DCRat payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1