General
-
Target
6783cedfbb7ee848a0bb6e5f9e849945.bin
-
Size
826KB
-
Sample
240701-cg6yyawekj
-
MD5
5a2eebc985ab3e7c01c69123e24cfcd0
-
SHA1
db54a2e1f7de402ddd7b62d7016a0f8aa69a87d2
-
SHA256
30b269ab236535ccb2035e6c2b66655cb30889a92b2218de90e22725a127c19b
-
SHA512
6f627130c9b7ab3643cfe915bc24055dddcc3209324c34370cba1f6e5bc4d33ce3407f5b1c36bf3bc57d70ccd16ef8d553453d67f9eee9952c900701db138618
-
SSDEEP
24576:VAheYhxZOkRlKoUEpGmXR+kYud5TvuSAPUZTA0o:+heYnUkRlXXpGId5LBEt
Behavioral task
behavioral1
Sample
ea6e4e54c6aa6df24c7a386a5ac3bd9a224d69ecd629a555744e72cde043cadd.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
ea6e4e54c6aa6df24c7a386a5ac3bd9a224d69ecd629a555744e72cde043cadd.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
ea6e4e54c6aa6df24c7a386a5ac3bd9a224d69ecd629a555744e72cde043cadd.exe
-
Size
1.2MB
-
MD5
6783cedfbb7ee848a0bb6e5f9e849945
-
SHA1
cdf977f9deb3c1db344a0cbaf09f3b64bfa812c5
-
SHA256
ea6e4e54c6aa6df24c7a386a5ac3bd9a224d69ecd629a555744e72cde043cadd
-
SHA512
be8440ffca1061d78c6657b0e4eaeedb2697d5cb612a66009ec2f38783c76876833348eb86b60ee06c0e076dd5ef16bf60ad59fe51ee8ee1c9ccf347e2e2f38d
-
SSDEEP
24576:CgUVDQapmJamx98IhSf5QdINv5dHnG3xu:C7DyfONvfu
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Modifies WinLogon for persistence
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1Scheduled Task
1