General
-
Target
AIO checker 2024.exe
-
Size
12.6MB
-
Sample
240602-n7bfhaca9x
-
MD5
9cf1d0469c0f1f4d320a9ca7f0e1cc60
-
SHA1
0dfb9cbecc894900df50ea91d6abc8064f7b3f4f
-
SHA256
28fd7c5f8ab145889653beee671957a07696794f4b0ac7343d5c25e43f66042b
-
SHA512
dee7e42a3e35759cdfa5b7ee4b76fab187b526478a4d47b41562a60e4970f755499faea1a33038ffe65d9ad5d916287ba7a54911a0fbf6ae3d0b47738329abdf
-
SSDEEP
196608:/nmvZD+tHWdKFyGL1fCQfV1ZvD+z/hcc1ICaivxj2RMvV+TfiwFrxuakIdxG:/na1+tHjN9fVL7+z63ivxjhUzX
Static task
static1
Behavioral task
behavioral1
Sample
AIO checker 2024.exe
Resource
win7-20240215-en
Malware Config
Targets
-
-
Target
AIO checker 2024.exe
-
Size
12.6MB
-
MD5
9cf1d0469c0f1f4d320a9ca7f0e1cc60
-
SHA1
0dfb9cbecc894900df50ea91d6abc8064f7b3f4f
-
SHA256
28fd7c5f8ab145889653beee671957a07696794f4b0ac7343d5c25e43f66042b
-
SHA512
dee7e42a3e35759cdfa5b7ee4b76fab187b526478a4d47b41562a60e4970f755499faea1a33038ffe65d9ad5d916287ba7a54911a0fbf6ae3d0b47738329abdf
-
SSDEEP
196608:/nmvZD+tHWdKFyGL1fCQfV1ZvD+z/hcc1ICaivxj2RMvV+TfiwFrxuakIdxG:/na1+tHjN9fVL7+z63ivxjhUzX
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-