Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
10fe25de503f...5a.exe
windows7-x64
10fe25de503f...5a.exe
windows10-2004-x64
10fe282eaa90...45.exe
windows7-x64
10fe282eaa90...45.exe
windows10-2004-x64
10fe402f76d3...4d.exe
windows7-x64
10fe402f76d3...4d.exe
windows10-2004-x64
10fe55574c53...c0.exe
windows7-x64
1fe55574c53...c0.exe
windows10-2004-x64
5fe8a65a43d...3f.exe
windows7-x64
7fe8a65a43d...3f.exe
windows10-2004-x64
7fe99ddfdfc...6c.exe
windows7-x64
10fe99ddfdfc...6c.exe
windows10-2004-x64
10feb2c82a66...50.exe
windows7-x64
10feb2c82a66...50.exe
windows10-2004-x64
10fef2b831e5...91.exe
windows7-x64
8fef2b831e5...91.exe
windows10-2004-x64
8ff03c0c01a...cd.exe
windows7-x64
7ff03c0c01a...cd.exe
windows10-2004-x64
10ff1699c2d9...5a.exe
windows7-x64
10ff1699c2d9...5a.exe
windows10-2004-x64
10ff573ccb26...dd.exe
windows7-x64
10ff573ccb26...dd.exe
windows10-2004-x64
10ff5eef1816...3f.exe
windows7-x64
10ff5eef1816...3f.exe
windows10-2004-x64
10ff9b69031d...c2.exe
windows7-x64
10ff9b69031d...c2.exe
windows10-2004-x64
10ffc0421dee...0b.exe
windows7-x64
10ffc0421dee...0b.exe
windows10-2004-x64
7ffc45f2c58...73.exe
windows7-x64
10ffc45f2c58...73.exe
windows10-2004-x64
10fffa7ee6ec...91.exe
windows7-x64
10fffa7ee6ec...91.exe
windows10-2004-x64
10General
-
Target
archive_63.zip
-
Size
16.6MB
-
Sample
250322-g243asy1gs
-
MD5
da56157918045aef5a930af0d866cba2
-
SHA1
ea37d14d38da6c3ee30ad7ec3f9625e83d49ee2a
-
SHA256
ec9fa98b9c0a55ad5d3b51bf6148b6e2041d1a14c36b4ad98caa9438bc3854e9
-
SHA512
018823503967b49b6021a737a5671045aef62fb89b35c33c412e57d19689c8196ec2bed8a380f9fa26bb44364d9ac9dced1cfd025de672b464c6f02f35e3ae68
-
SSDEEP
393216:H77W5szE6LLPsj7cbOZm3cKU54N6RsBq2xgWNfsNpnqkSC:H7aslsjaOAU54N6uwcPaf
Behavioral task
behavioral1
Sample
fe25de503f5fa57842d11d2180a935855b8f89b23fd6fa95ff10272cee5f305a.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
fe25de503f5fa57842d11d2180a935855b8f89b23fd6fa95ff10272cee5f305a.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral3
Sample
fe282eaa9036b889aafc6db602127b45.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
fe282eaa9036b889aafc6db602127b45.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
fe402f76d319a9f80cd522e793223efbc3f914bfe149da1801c999b8539c964d.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
fe402f76d319a9f80cd522e793223efbc3f914bfe149da1801c999b8539c964d.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
fe55574c53882722b864ad5f07d521c0.exe
Resource
win7-20241023-en
Behavioral task
behavioral8
Sample
fe55574c53882722b864ad5f07d521c0.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
fe8a65a43dcdd12c0341ab7e5cc56c3f.exe
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
fe8a65a43dcdd12c0341ab7e5cc56c3f.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
fe99ddfdfc78f8223ddd4511fafbccd50e22d089c428f9c6cea01d89b2142c6c.exe
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
fe99ddfdfc78f8223ddd4511fafbccd50e22d089c428f9c6cea01d89b2142c6c.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
feb2c82a6695709d9304734b55a6a350.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
feb2c82a6695709d9304734b55a6a350.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
fef2b831e5d7a921a1fce11bc1827b87250bbca7552946a14444c35dbc4e1591.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
fef2b831e5d7a921a1fce11bc1827b87250bbca7552946a14444c35dbc4e1591.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
ff03c0c01a5acef84aa5acdf32b445cd.exe
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
ff03c0c01a5acef84aa5acdf32b445cd.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
ff1699c2d9f4f22e51e270417a93a15a.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
ff1699c2d9f4f22e51e270417a93a15a.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral21
Sample
ff573ccb268f734e737c764bc60f0ddd.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
ff573ccb268f734e737c764bc60f0ddd.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
ff5eef1816b5037715c6da38464a8a3f.exe
Resource
win7-20241010-en
Behavioral task
behavioral24
Sample
ff5eef1816b5037715c6da38464a8a3f.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
ff9b69031d761a8641f29c72ab6db843864620d9db1b867995e370840a891cc2.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
ff9b69031d761a8641f29c72ab6db843864620d9db1b867995e370840a891cc2.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
ffc0421deeff7949183a7fbc2e55850b.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
ffc0421deeff7949183a7fbc2e55850b.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
ffc45f2c5865480a76df2d8f64009673.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
ffc45f2c5865480a76df2d8f64009673.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
fffa7ee6ec076412930605bd55bbc491.exe
Resource
win7-20240903-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1351005466335121518/twCTnfzoSiI-aCcNO4qPr6FH-T4gOkPWQV2wxS9C01GGw7XemgcLtgFXaMAxuEVtAD2v
Extracted
xworm
xkpog9yml.localto.net:5392
:5392
-
Install_directory
%Temp%
-
install_file
windowsservice.exe
Extracted
xworm
5.0
192.168.31.83:7000
YenTYj55WBldZrhk
-
Install_directory
%AppData%
-
install_file
XClient.exe
Extracted
remcos
1.7 Pro
Host
systemcontrol.ddns.net:45000
systemcontrol2.ddns.net:45000
-
audio_folder
audio
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
5
-
copy_file
OfficeUpgrade.exe
-
copy_folder
OfficeUpgrade
-
delete_file
false
-
hide_file
true
-
hide_keylog_file
true
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
true
-
keylog_file
Upgrader.dat
-
keylog_flag
false
-
keylog_folder
Upgrader
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
req_khauflaoyr
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screens
-
screenshot_path
%AppData%
-
screenshot_time
1
-
startup_value
OfficeUpgrade
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
fe25de503f5fa57842d11d2180a935855b8f89b23fd6fa95ff10272cee5f305a.exe
-
Size
246KB
-
MD5
34498c04705f269e79dd09c555ffd2a4
-
SHA1
744d9cdaaf4033b944563fb79800c8ddeffffeab
-
SHA256
fe25de503f5fa57842d11d2180a935855b8f89b23fd6fa95ff10272cee5f305a
-
SHA512
fd3f4f296d62376f08a1ce9dc8b4baefe03334edc2d55633fe8016cf0e90e067a7b6949e73605e102aa22f389da96ef8e8c1589f521583173d28fdd195e0a3a2
-
SSDEEP
6144:2loZMKrIkd8g+EtXHkv/iD44Uysn9GuBD0dP6aPahb8e1mJchi3:AoZRL+EP84Uysn9GuBD0dP6aPW+c43
-
Detect Umbral payload
-
Umbral family
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
-
-
Target
fe282eaa9036b889aafc6db602127b45.exe
-
Size
885KB
-
MD5
fe282eaa9036b889aafc6db602127b45
-
SHA1
65e037b4c6a892801ac475c201219167f89d1f48
-
SHA256
1a55e2bcf26895655a7da6acda6ecbdbef033d60bf805aaf4ef88c0cf6348cb6
-
SHA512
c3a913f2ba698ec5d387cb394b7b6fb600271dcb7d2db8c8162d2f6c90c9dd123d4f9dcbd482d6ee8e76c83cacb566faf4f7bd92fea981e2c49fee8817854d39
-
SSDEEP
12288:8lNE5VnZuh+ZIlXJBH5SP2I/lwvDT77/wOKsV42i3GULVaHeopyyx:8lNCv6XJ5BClaXfD9vUha+u
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
-
-
Target
fe402f76d319a9f80cd522e793223efbc3f914bfe149da1801c999b8539c964d.exe
-
Size
1.6MB
-
MD5
82d57ff1bfcade0c2a515e8f860739eb
-
SHA1
01c4325519c55f650dd5fb98e9c41422c987f982
-
SHA256
fe402f76d319a9f80cd522e793223efbc3f914bfe149da1801c999b8539c964d
-
SHA512
7c0477a2289ff1c1c943f3938166cd8c00c898d212329c84de27140942918b028afa2186fff12694bc914fec8cf1141813f0e3024a5d653ebb4dbc6c6d2fe519
-
SSDEEP
24576:xU5rv4BImFXHPqAv21Y9odIq+gnEJWoOyrHDBEPkyFzN3AAkzvL+x:hpftpodIq+sEJWArjBEPk4z61vL+
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Modifies WinLogon for persistence
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops file in System32 directory
-
-
-
Target
fe55574c53882722b864ad5f07d521c0.exe
-
Size
474KB
-
MD5
fe55574c53882722b864ad5f07d521c0
-
SHA1
b899eadaab87554aa3b7703fcd1f222df4984661
-
SHA256
3a56e488aafbe5ed4cab6c23d375afdc8a3e5d65a049644505fb11e0ca893361
-
SHA512
6929e791a0267372e0da0fd646d8f623b6927545680114845b1471824c78aa534cceed82782ad44acb6c7680c53b93b2d642b7a8a3780fd7f2f979d2ad1056ab
-
SSDEEP
12288:FkQLJR6x0yHmwzyEjEgqaCanpEowh20Y:OQX6x0yG0yEw8OrY
-
Enumerates processes with tasklist
-
-
-
Target
fe8a65a43dcdd12c0341ab7e5cc56c3f.exe
-
Size
7.9MB
-
MD5
fe8a65a43dcdd12c0341ab7e5cc56c3f
-
SHA1
237ef3713a9ac7680f4f8ffc8c91c75b23f44b70
-
SHA256
ffb47a00036b3d8580bd9cb61aed80d3658598bf0fc8a96dc8d81f04980a8f65
-
SHA512
9032a4015ff5d172e26be7f91e6d11f33032784f48fd5f8d51a4d2a8b2a79c634f2efd081ea448728e14dad338f2f76a57a87bb35e22de5fdc04b9ad0eb01c3e
-
SSDEEP
196608:J9sGLbd7rEWWn87E3QeotSqrG8YqcIXcZZB9:JmqbhrEbn87eZsFmq+J
Score7/10-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
-
-
Target
fe99ddfdfc78f8223ddd4511fafbccd50e22d089c428f9c6cea01d89b2142c6c.exe
-
Size
144KB
-
MD5
2c55bdee9b3ac74ea1c16c0c86deb93c
-
SHA1
f74a12160819d97888e93e5b56067d4b24413791
-
SHA256
fe99ddfdfc78f8223ddd4511fafbccd50e22d089c428f9c6cea01d89b2142c6c
-
SHA512
aebb19b54103f9aa2efda1da908fd08bd9e426610e7c6bccda92ceb0dd8116795b5ed54e6d05c2eb8588eb63fb2916970e443fc6639451e330e093d39f7ce3ae
-
SSDEEP
3072:3IJrjowkba1TOi1M+lmsolAIrRuw+mqv9j1MWLQI:3IdAbT+lDAA
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
-
-
Target
feb2c82a6695709d9304734b55a6a350.exe
-
Size
1.1MB
-
MD5
feb2c82a6695709d9304734b55a6a350
-
SHA1
3554b395961de66e5d84c1fc0ba527a0c205d965
-
SHA256
56d979b2ce2e20c7cb13c3cf49ec8c462f311fe38f2b75e80a4e90dee425c844
-
SHA512
952f21c0c48c66e5a17c4cd757d107de6d45fff4b2e0e8506e29910287b9888e8f8f5344edda596393d23d300c3048a60b6ae94386daf1acbf4c8032612ac2db
-
SSDEEP
12288:qmc4TfAkdN7TPPl2Eh8Nv6L1FMCubuoGTeh46qTnnCPQeB89hNuD1hOp1i3l10gR:qh4TbLUEhZL/GspeYhkc9Soh2SfwJ
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Modifies WinLogon for persistence
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
UAC bypass
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Checks whether UAC is enabled
-
Drops file in System32 directory
-
-
-
Target
fef2b831e5d7a921a1fce11bc1827b87250bbca7552946a14444c35dbc4e1591.exe
-
Size
3.2MB
-
MD5
7494010a358747ff81d28f600257398c
-
SHA1
2e23901e568bc0c51f9c8da9a193c52c0b9b6be8
-
SHA256
fef2b831e5d7a921a1fce11bc1827b87250bbca7552946a14444c35dbc4e1591
-
SHA512
be92074b60041dd130f13f548cf5d004605efd9aae0a4f362b5c40060b740ff97b5f531d0648e73e30a63cc611ff007d6a091fed301092485d886ad67eaddcfb
-
SSDEEP
98304:nRS6nfSOQZOt+CW+7EELhF3gxpNOf2k2Y/d:nkj8NBFwxpNOuk2I
Score8/10-
Stops running service(s)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
-
-
Target
ff03c0c01a5acef84aa5acdf32b445cd.exe
-
Size
135KB
-
MD5
ff03c0c01a5acef84aa5acdf32b445cd
-
SHA1
77af93279f4ae2982295644f6ce973a3ebb7ff9b
-
SHA256
0b6f9ec209f440c66c54faa378f8208e8aa8d996156161f52d580dcdcaeb3e08
-
SHA512
b1ea91b7dfe6a3ce52ffd351324c5f623a3dd33788ff0973240b498b0da167121b142bb8642f70692e6f5ff321a5fe6cf647231a520880d7f48b14e46b4cd61f
-
SSDEEP
1536:ITHiPBX4nDzMyRXGHrc9YRHqbTypgpmb5Q+ZReSdhk/J+YLgD3mrxb53cSuYQjK4:xPd4n/M+WLcilrpgGH/GwY87mVmIXI
Score10/10-
Remcos family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
-
-
Target
ff1699c2d9f4f22e51e270417a93a15a.exe
-
Size
849KB
-
MD5
ff1699c2d9f4f22e51e270417a93a15a
-
SHA1
9f17a9e3c2d549d24fa993c723a3ad50b7f60ba6
-
SHA256
5569d2a749ae8057fb0b05849ad9bf5cef65f28c081cae2a2ddc8ae1e7c76528
-
SHA512
dc7fac70d397ad94321b1b81c2d53cfe4bc6d444e4f7a5a5f6804ab1529ca6ed41cd1a16675738ce2f083e291bdd4f7efe3053cff61ce4287a5fc719a90c910d
-
SSDEEP
12288:o6NE5ig5Fttrh5PxjUm5SvDdLILaBFkjKuAMx6A5gtbGk84Ca04jtiPBgGKYTx:o6N297PxbsKtC5AHgk
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
-
-
Target
ff573ccb268f734e737c764bc60f0ddd.exe
-
Size
78KB
-
MD5
ff573ccb268f734e737c764bc60f0ddd
-
SHA1
f6307bb87f39aff19b50aa309ad56ea22eb69f65
-
SHA256
42e0a790c9bbab15940b9e180973a701e2cc10b1bbfe1e2bd7cb2fca96033fed
-
SHA512
cc143a391b8793609d22fba916ed5ee12719bfd169f31c43cffe926c7bed1c10da17ed7e98ef4cce4709f1000f2b77b558cac1d33be5d72e4e229b688cbf99d9
-
SSDEEP
1536:SRWV586dy0MochZDsC8Kl/99Z242UdIAkn3jKZPjoYaoQtC6p9/I16D:SRWV581n7N041Qqhgx9/5
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Metamorpherrat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
-
-
Target
ff5eef1816b5037715c6da38464a8a3f.exe
-
Size
1.1MB
-
MD5
ff5eef1816b5037715c6da38464a8a3f
-
SHA1
ba123a98299528f73ad8cbfa234d3fd9a78c47f5
-
SHA256
66495902f22ee35be8d28b76ed4bee1a60e9b39bbddba2118e8dcac14ed24104
-
SHA512
daa099d8a747e563a7371500abba63f9c1746eb6916d233949b20e99ab11408caac85e49638e3f5d14757180c53477ec1d9bf99f99d99636c17aa819d62d802c
-
SSDEEP
12288:Kmc4TfAkdN7TPPl2Eh8Nv6L1FMCubuoGTeh46qTnnCPQeB89hNuD1hOp1i3l10gR:Kh4TbLUEhZL/GspeYhkc9Soh2SfwJ
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Modifies WinLogon for persistence
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
UAC bypass
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Checks whether UAC is enabled
-
Drops file in System32 directory
-
-
-
Target
ff9b69031d761a8641f29c72ab6db843864620d9db1b867995e370840a891cc2.exe
-
Size
2.0MB
-
MD5
75bd3c5ea13295c7d85a7fea4a272f07
-
SHA1
aafcc739ed77771c81c04c51ce9245659f6534cc
-
SHA256
ff9b69031d761a8641f29c72ab6db843864620d9db1b867995e370840a891cc2
-
SHA512
9adf5a8ccf294070d01fb19c2bbe784a33cfed2ca87bd31f9ebd1f774d566631c1866b8d66ae80b9c6d9c38f1e498120ac9f738698fa4274f2bc6a79424b1842
-
SSDEEP
49152:zrYU+Yy4J8jao9UVlWAOjhRzsiYHjo++xTN:zdxVJC9UqRzsu+8N
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
-
-
Target
ffc0421deeff7949183a7fbc2e55850b.exe
-
Size
78KB
-
MD5
ffc0421deeff7949183a7fbc2e55850b
-
SHA1
5b888b2bf9e78a7c4c1eababc2446b748278c72c
-
SHA256
55d9d11da5706ae89bb9891ea49eb9c86b1bc7e253d7bd3cd5d4ce6c28a91a4c
-
SHA512
c2bb1eb1353ec4903555dac8371ac1740739f5a56976e81c5d6c904047f38c039bd6e302b889278663ddd66f63407f54601ea261919e3155fb8849dc6c35712c
-
SSDEEP
1536:dHY6638dy0MochZDsC8Kl/99Z242UdIAkn3jKZPjoYaoQtM9/Q1GI:dHY53Ln7N041QqhgM9/m
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Metamorpherrat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
-
-
Target
ffc45f2c5865480a76df2d8f64009673.exe
-
Size
885KB
-
MD5
ffc45f2c5865480a76df2d8f64009673
-
SHA1
ed4d772472682c390f3adcbab5f34758e34255a2
-
SHA256
2301d9d871089a3d47d66f630934afd65d4be33e3650a14e016275635c2b736b
-
SHA512
44907f4b8add6cbf4534ef39180c054ac80f47e94e730afb4b5ee53207476bea980fcda1be66283f4fd20ff9d6923e89e74c375fda74068249b2fbe27b8e158a
-
SSDEEP
12288:ElNE5VnZuh+ZIlXJBH5SP2I/lwvDT77/wOKsV42i3GULVaHeopyyx:ElNCv6XJ5BClaXfD9vUha+u
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Drops file in System32 directory
-
-
-
Target
fffa7ee6ec076412930605bd55bbc491.exe
-
Size
45KB
-
MD5
fffa7ee6ec076412930605bd55bbc491
-
SHA1
a9a19e0a8e7ab2b0770b6507315b764571ba60f6
-
SHA256
7c4a0a8ba7e030ee3797fd56d465a4261e7a5eb4a57e703485cc702b5c73a35f
-
SHA512
4fa60f50aa71e65d71595eda3ff4c7dea3d3ae52414714c3fa25d3b666e16968cdc0b24dab3cb4d2b58aad681d55397a9899f7ba3226372dffc037bd782b3293
-
SSDEEP
768:81jGUOC1hHJ90bUWGdBEcNcJhlVvD4xeVhKfkHLbFEPa9pvN6iOChjzjuf4j:8pL51hp9XRajlZrOM/FJ9NN6iOCBagj
-
Detect Xworm Payload
-
Xworm family
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
3PowerShell
2Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify Tools
1Modify Registry
4Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1