General
-
Target
6d4ef6f0c39215c0af0c1c27d4ffa791.exe
-
Size
2.7MB
-
Sample
250208-af7gzawldl
-
MD5
6d4ef6f0c39215c0af0c1c27d4ffa791
-
SHA1
7c08658bce2a986fd39e5083302443838b3d0bb3
-
SHA256
82aaf8a6c7718e883bf7f9cb3d18a7889a8080227f14f9bc1ce0e9efa77d651b
-
SHA512
51e774b0e91085fad49b5efb5c582f456ea97849947096e506c76addb43591db3b7e97165b938e06d0f7d57e3201c66442e38f85d0ef73a578ef35761df17693
-
SSDEEP
49152:3FBbm1L31i0DcUvyI2JmrVN5KXgDaWicjl5kYaYdYCag2X/DPScyr9Jy:Hb+jWAyIZz4XgWWFjfrWCf2X/bA9Jy
Behavioral task
behavioral1
Sample
6d4ef6f0c39215c0af0c1c27d4ffa791.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
6d4ef6f0c39215c0af0c1c27d4ffa791.exe
Resource
win10v2004-20250207-en
Malware Config
Targets
-
-
Target
6d4ef6f0c39215c0af0c1c27d4ffa791.exe
-
Size
2.7MB
-
MD5
6d4ef6f0c39215c0af0c1c27d4ffa791
-
SHA1
7c08658bce2a986fd39e5083302443838b3d0bb3
-
SHA256
82aaf8a6c7718e883bf7f9cb3d18a7889a8080227f14f9bc1ce0e9efa77d651b
-
SHA512
51e774b0e91085fad49b5efb5c582f456ea97849947096e506c76addb43591db3b7e97165b938e06d0f7d57e3201c66442e38f85d0ef73a578ef35761df17693
-
SSDEEP
49152:3FBbm1L31i0DcUvyI2JmrVN5KXgDaWicjl5kYaYdYCag2X/DPScyr9Jy:Hb+jWAyIZz4XgWWFjfrWCf2X/bA9Jy
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
UAC bypass
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Checks whether UAC is enabled
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
2