| File name: | 2025-05-27_e99c064a23270272d1f8cc12fa9f19f8_amadey_black-basta_cova_cryptbot_dcrat_elex_luca-stealer |
| Full analysis: | https://app.any.run/tasks/5ddaa5c1-1d9b-410a-9241-5e8885bb3c87 |
| Verdict: | Malicious activity |
| Threats: | DCrat, also known as Dark Crystal RAT, is a remote access trojan (RAT), which was first introduced in 2018. It is a modular malware that can be customized to perform different tasks. For instance, it can steal passwords, crypto wallet information, hijack Telegram and Steam accounts, and more. Attackers may use a variety of methods to distribute DCrat, but phishing email campaigns are the most common. |
| Analysis date: | May 27, 2025, 19:43:49 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows, 6 sections |
| MD5: | E99C064A23270272D1F8CC12FA9F19F8 |
| SHA1: | 3FE01F7324837E3EBE90FFD56CFF22925810F7DD |
| SHA256: | B3F008DC3EC56D6E7D991CC97E5E3241B6D71A7D0D5BA64A35498E7B9F6128A2 |
| SSDEEP: | 98304:5yi3h8kdMUYVrZuvI1Qsjx8uf7xhh/LLSTEtcOSMnKrBoOkcvofXGkkVxFZ7Nofx:zhQ |
| .exe | | | Win64 Executable (generic) (64.6) |
|---|---|---|
| .dll | | | Win32 Dynamic Link Library (generic) (15.4) |
| .exe | | | Win32 Executable (generic) (10.5) |
| .exe | | | Generic Win/DOS Executable (4.6) |
| .exe | | | DOS Executable Generic (4.6) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2022:03:03 13:15:57+00:00 |
| ImageFileCharacteristics: | Executable, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 14.3 |
| CodeSize: | 203776 |
| InitializedDataSize: | 343040 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x1f530 |
| OSVersion: | 5.1 |
| ImageVersion: | - |
| SubsystemVersion: | 5.1 |
| Subsystem: | Windows GUI |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 672 | schtasks.exe /create /tn "comrefBrokermonitorc" /sc MINUTE /mo 6 /tr "'C:\AgentfontSaves\comrefBrokermonitor.exe'" /f | C:\Windows\System32\schtasks.exe | — | WmiPrvSE.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Task Scheduler Configuration Tool Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 976 | C:\found.000\dir0000.chk\sihost.exe | C:\found.000\dir0000.chk\sihost.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Version: 1.2.7.1277 Modules
| |||||||||||||||
| 1012 | "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Recovery/' | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | — | comrefBrokermonitor.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows PowerShell Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1040 | "powershell" -Command Add-MpPreference -ExclusionPath 'C:/System Volume Information/' | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | — | comrefBrokermonitor.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows PowerShell Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1072 | schtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 14 /tr "'C:\Users\Administrator\TextInputHost.exe'" /f | C:\Windows\System32\schtasks.exe | — | WmiPrvSE.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Task Scheduler Configuration Tool Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1128 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | powershell.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1184 | schtasks.exe /create /tn "audiodga" /sc MINUTE /mo 11 /tr "'C:\Windows\apppatch\AppPatch64\audiodg.exe'" /rl HIGHEST /f | C:\Windows\System32\schtasks.exe | — | WmiPrvSE.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Task Scheduler Configuration Tool Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1188 | schtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\Windows\apppatch\AppPatch64\audiodg.exe'" /rl HIGHEST /f | C:\Windows\System32\schtasks.exe | — | WmiPrvSE.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Task Scheduler Configuration Tool Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1276 | schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 8 /tr "'C:\Recovery\Logs\csrss.exe'" /f | C:\Windows\System32\schtasks.exe | — | WmiPrvSE.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Task Scheduler Configuration Tool Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1568 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | powershell.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (7256) 2025-05-27_e99c064a23270272d1f8cc12fa9f19f8_amadey_black-basta_cova_cryptbot_dcrat_elex_luca-stealer.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vbe\OpenWithProgids |
| Operation: | write | Name: | VBEFile |
Value: | |||
| (PID) Process: | (7648) comrefBrokermonitor.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\99e3c7dec2e52a9ac861aa911579793346b73d86 |
| Operation: | write | Name: | 1054436a23bf955cdbcd039e4fa60ae6c204cd8e |
Value: H4sIAAAAAAAEAGWOvQ7CMAyEXwV1RlUHxMBWYACJAfEjBswQNW4blcaR45Ty9qRlKWKyfff5dPdkswIoKVidZlkGoA3HmaVF3QB4U5OXFHtM5iN4woI65DfAgSoPUHj2fuJfPXKUc90aa7ywEmKAC/ayty7I7jftZqymV+SVc05JUcdP547DtlxENWhDuvqP32KpwlNmwxk7BSumxTVTgzyB8wqtlGTlrDoculLLWH6xlqyJ1Ub68QHe1t6DBAEAAA== | |||
| (PID) Process: | (7648) comrefBrokermonitor.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run |
| Operation: | write | Name: | sihost |
Value: "C:\found.000\dir0000.chk\sihost.exe" | |||
| (PID) Process: | (7648) comrefBrokermonitor.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run |
| Operation: | write | Name: | sihost |
Value: "C:\found.000\dir0000.chk\sihost.exe" | |||
| (PID) Process: | (7648) comrefBrokermonitor.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon |
| Operation: | write | Name: | Shell |
Value: explorer.exe, "C:\found.000\dir0000.chk\sihost.exe" | |||
| (PID) Process: | (7648) comrefBrokermonitor.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run |
| Operation: | write | Name: | csrss |
Value: "C:\Recovery\Logs\csrss.exe" | |||
| (PID) Process: | (7648) comrefBrokermonitor.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run |
| Operation: | write | Name: | csrss |
Value: "C:\Recovery\Logs\csrss.exe" | |||
| (PID) Process: | (7648) comrefBrokermonitor.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon |
| Operation: | write | Name: | Shell |
Value: explorer.exe, "C:\found.000\dir0000.chk\sihost.exe", "C:\Recovery\Logs\csrss.exe" | |||
| (PID) Process: | (7648) comrefBrokermonitor.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run |
| Operation: | write | Name: | TextInputHost |
Value: "C:\Users\Administrator\TextInputHost.exe" | |||
| (PID) Process: | (7648) comrefBrokermonitor.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run |
| Operation: | write | Name: | TextInputHost |
Value: "C:\Users\Administrator\TextInputHost.exe" | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 7460 | comrefBrokermonitor.exe | C:\Users\admin\Desktop\yFqeoYfe.log | executable | |
MD5:16B480082780CC1D8C23FB05468F64E7 | SHA256:7A080D8BD178EC02C7F39F7F941479074C450C4FDD8E963C993D2FB5537C7708 | |||
| 7256 | 2025-05-27_e99c064a23270272d1f8cc12fa9f19f8_amadey_black-basta_cova_cryptbot_dcrat_elex_luca-stealer.exe | C:\AgentfontSaves\6wj3NtTapL2Gw4rjKpNX8twQCaI1y6Q71yJPi7J6UKnaZQ.vbe | vbe | |
MD5:BE0C2187D938BF123121F69F1E2FBE94 | SHA256:F000F41E1F3541AAC0715A2FE924B669B921DC51AEDD7B6C73F32F10FEA265DD | |||
| 7460 | comrefBrokermonitor.exe | C:\Users\admin\Desktop\yWxxCuZh.log | executable | |
MD5:87765D141228784AE91334BAE25AD743 | SHA256:9A121719F71383CF66FC36453679B36C8D24CC61EB335D0C304536E5D72AAAEB | |||
| 7460 | comrefBrokermonitor.exe | C:\Users\admin\Desktop\IFQNmWeO.log | executable | |
MD5:9E910782CA3E88B3F87826609A21A54E | SHA256:3B311986251EE5A303671108AFBAF43E0255C4CAE1C26CC9600BB0C7D22D3864 | |||
| 7460 | comrefBrokermonitor.exe | C:\Users\admin\Desktop\niSGSiez.log | executable | |
MD5:9B25959D6CD6097C0EF36D2496876249 | SHA256:4DBA0293B2BA9478EC0738BAD92F0E56CB7CF800B0CA4FDA8261EE2C0C91E217 | |||
| 7256 | 2025-05-27_e99c064a23270272d1f8cc12fa9f19f8_amadey_black-basta_cova_cryptbot_dcrat_elex_luca-stealer.exe | C:\AgentfontSaves\y9fctaWMk.bat | text | |
MD5:03B2BDCA1DF40683BDCEE17D77459588 | SHA256:A198A54436A10A0423CAEC37775246E2F854384C037A715BCBC0BE646C0C07F8 | |||
| 7460 | comrefBrokermonitor.exe | C:\Users\admin\Desktop\VWrBzMJk.log | executable | |
MD5:A4F19ADB89F8D88DBDF103878CF31608 | SHA256:D0613773A711634434DB30F2E35C6892FF54EBEADF49CD254377CAECB204EAA4 | |||
| 7460 | comrefBrokermonitor.exe | C:\Users\admin\Desktop\QjZCWQuw.log | executable | |
MD5:F4B38D0F95B7E844DD288B441EBC9AAF | SHA256:AAB95596475CA74CEDE5BA50F642D92FA029F6F74F6FAEAE82A9A07285A5FB97 | |||
| 7256 | 2025-05-27_e99c064a23270272d1f8cc12fa9f19f8_amadey_black-basta_cova_cryptbot_dcrat_elex_luca-stealer.exe | C:\AgentfontSaves\comrefBrokermonitor.exe | executable | |
MD5:2A577C19629CFF4F915A5E14F51ADE29 | SHA256:6E1AFD912CBDE74D8E254E679BD9D054B17045F8AD0374F2C89F8F5183CA42F1 | |||
| 7460 | comrefBrokermonitor.exe | C:\Users\admin\Desktop\kAMiqVFL.log | executable | |
MD5:D8BF2A0481C0A17A634D066A711C12E9 | SHA256:2B93377EA087225820A9F8E4F331005A0C600D557242366F06E0C1EAE003D669 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
— | — | GET | 304 | 4.245.163.56:443 | https://slscr.update.microsoft.com/SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.4046/0?CH=686&L=en-US&P=&PT=0x30&WUA=10.0.19041.3996&MK=DELL&MD=DELL | unknown | — | — | — |
— | — | GET | 200 | 4.245.163.56:443 | https://slscr.update.microsoft.com/SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.4046/0?CH=686&L=en-US&P=&PT=0x30&WUA=10.0.19041.3996&MK=DELL&MD=DELL | unknown | compressed | 23.9 Kb | whitelisted |
9032 | SIHClient.exe | GET | 200 | 2.23.246.101:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.1.crl | unknown | — | — | whitelisted |
9032 | SIHClient.exe | GET | 200 | 2.23.246.101:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | whitelisted |
9032 | SIHClient.exe | GET | 200 | 23.48.23.162:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl | unknown | — | — | whitelisted |
9032 | SIHClient.exe | GET | 200 | 23.48.23.162:80 | http://crl.microsoft.com/pki/crl/products/MicTimStaPCA_2010-07-01.crl | unknown | — | — | whitelisted |
2104 | svchost.exe | GET | 200 | 23.48.23.158:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
2104 | svchost.exe | GET | 200 | 2.23.246.101:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
— | — | POST | 200 | 20.190.160.3:443 | https://login.live.com/RST2.srf | unknown | xml | 1.24 Kb | whitelisted |
— | — | POST | 400 | 40.126.32.68:443 | https://login.live.com/ppsecure/deviceaddcredential.srf | unknown | text | 203 b | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
2104 | svchost.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
— | — | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
3216 | svchost.exe | 172.211.123.249:443 | client.wns.windows.com | MICROSOFT-CORP-MSN-AS-BLOCK | FR | whitelisted |
2104 | svchost.exe | 23.48.23.158:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
2104 | svchost.exe | 2.23.246.101:80 | www.microsoft.com | Ooredoo Q.S.C. | QA | whitelisted |
6544 | svchost.exe | 40.126.32.68:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
2104 | svchost.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
7648 | comrefBrokermonitor.exe | 34.117.59.81:443 | ipinfo.io | GOOGLE-CLOUD-PLATFORM | US | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
login.live.com |
| whitelisted |
ipinfo.io |
| whitelisted |
api.telegram.org |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |
fe3cr.delivery.mp.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
7648 | comrefBrokermonitor.exe | Device Retrieving External IP Address Detected | ET INFO Possible External IP Lookup Domain Observed in SNI (ipinfo. io) |
7648 | comrefBrokermonitor.exe | Device Retrieving External IP Address Detected | ET INFO External IP Lookup SSL Cert Observed (ipinfo .io) |
2196 | svchost.exe | Device Retrieving External IP Address Detected | ET INFO External IP Lookup Domain in DNS Lookup (ipinfo .io) |
— | — | Device Retrieving External IP Address Detected | SUSPICIOUS [ANY.RUN] An IP address was received from the server as a result of an HTTP request |
— | — | Device Retrieving External IP Address Detected | ET INFO External IP Lookup ipinfo.io |
— | — | Device Retrieving External IP Address Detected | ET INFO External IP Lookup ipinfo.io |
2196 | svchost.exe | Misc activity | SUSPICIOUS [ANY.RUN] Possible sending an external IP address to Telegram |
2196 | svchost.exe | Misc activity | ET HUNTING Telegram API Domain in DNS Lookup |
7648 | comrefBrokermonitor.exe | Misc activity | ET HUNTING Observed Telegram API Domain (api .telegram .org in TLS SNI) |
7648 | comrefBrokermonitor.exe | Misc activity | ET HUNTING Telegram API Certificate Observed |