Resubmissions

02-02-2025 07:12

250202-h1jkmssrdq 10

02-02-2025 06:49

250202-hlvdlazqcz 10

02-02-2025 06:44

250202-hhwggssjhj 8

27-01-2025 20:23

250127-y57e9strcv 8

27-01-2025 20:00

250127-yq1deatlhw 8

General

  • Target

    http://193.233.237.45/izgojBuild.exe

  • Sample

    250202-h1jkmssrdq

Malware Config

Targets

    • Target

      http://193.233.237.45/izgojBuild.exe

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks