General
-
Target
5fd4c916b038c2c30467f8ce764ac0f9.exe
-
Size
2.7MB
-
Sample
250207-2y484ssley
-
MD5
5fd4c916b038c2c30467f8ce764ac0f9
-
SHA1
54f538892c45415b55252ca441ce9f316a8cf8c0
-
SHA256
4d460e49e0c569a7593cd7fd6e3a181b2e25dd7b98bd2906015007bd241b4d86
-
SHA512
d8ed5e135ea795491db6e66112699d5c21f386025fee0645060a4c5cee8b4f0f4115cc254189a11686741e7601ec6a6f12e6bba45bc410d9f91334d61d37594d
-
SSDEEP
49152:3jgByCva+AtOYESlRp3bBKelCRxlOiOYl74sYe4IDhUdK7oIgSOrREmUGs:4q0SlRBdJ2xQO7t4IDhF7oInixU
Behavioral task
behavioral1
Sample
5fd4c916b038c2c30467f8ce764ac0f9.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
5fd4c916b038c2c30467f8ce764ac0f9.exe
Resource
win10v2004-20250207-en
Malware Config
Targets
-
-
Target
5fd4c916b038c2c30467f8ce764ac0f9.exe
-
Size
2.7MB
-
MD5
5fd4c916b038c2c30467f8ce764ac0f9
-
SHA1
54f538892c45415b55252ca441ce9f316a8cf8c0
-
SHA256
4d460e49e0c569a7593cd7fd6e3a181b2e25dd7b98bd2906015007bd241b4d86
-
SHA512
d8ed5e135ea795491db6e66112699d5c21f386025fee0645060a4c5cee8b4f0f4115cc254189a11686741e7601ec6a6f12e6bba45bc410d9f91334d61d37594d
-
SSDEEP
49152:3jgByCva+AtOYESlRp3bBKelCRxlOiOYl74sYe4IDhUdK7oIgSOrREmUGs:4q0SlRBdJ2xQO7t4IDhF7oInixU
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
UAC bypass
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Checks whether UAC is enabled
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
2