General
-
Target
591f9eba78261505ce83e1b6fca9388e8c932d604b1b376a21ee7c99182665de
-
Size
2.2MB
-
Sample
250202-3e4nxatpej
-
MD5
86f0b098d34e7964a9da4131d1d58fa9
-
SHA1
614cbbda0058cefe56cf2e9c0db2e06f95a195a5
-
SHA256
591f9eba78261505ce83e1b6fca9388e8c932d604b1b376a21ee7c99182665de
-
SHA512
ca8bb85f6c5cf9766806965d00d9ceaaa490fc93c88fa70de27542cd5520c428a48e9a91c912940858e4c3948f4bc362ce98c76a2e24099341c88f9e3a2289a3
-
SSDEEP
24576:tg/TM3unSV8JHYj0M14oMKhqN8+r/tse9WPJXelRWjq+jPx8FT2t6nTtHtO3g4Jc:mQenScjKkr/y+qXeliq+iT2t60g7Er3
Behavioral task
behavioral1
Sample
591f9eba78261505ce83e1b6fca9388e8c932d604b1b376a21ee7c99182665de.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
591f9eba78261505ce83e1b6fca9388e8c932d604b1b376a21ee7c99182665de.exe
Resource
win10v2004-20250129-en
Malware Config
Targets
-
-
Target
591f9eba78261505ce83e1b6fca9388e8c932d604b1b376a21ee7c99182665de
-
Size
2.2MB
-
MD5
86f0b098d34e7964a9da4131d1d58fa9
-
SHA1
614cbbda0058cefe56cf2e9c0db2e06f95a195a5
-
SHA256
591f9eba78261505ce83e1b6fca9388e8c932d604b1b376a21ee7c99182665de
-
SHA512
ca8bb85f6c5cf9766806965d00d9ceaaa490fc93c88fa70de27542cd5520c428a48e9a91c912940858e4c3948f4bc362ce98c76a2e24099341c88f9e3a2289a3
-
SSDEEP
24576:tg/TM3unSV8JHYj0M14oMKhqN8+r/tse9WPJXelRWjq+jPx8FT2t6nTtHtO3g4Jc:mQenScjKkr/y+qXeliq+iT2t60g7Er3
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
UAC bypass
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Checks whether UAC is enabled
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1