General

  • Target

    AimWare.exe

  • Size

    3.9MB

  • Sample

    240727-x7s5zsxhpg

  • MD5

    3fc02228a6229bc91c086bc24899361b

  • SHA1

    3d33e93f771a1c77f2f01c2e15d52307f88d3bf0

  • SHA256

    34be0ed06faf7cf7e8af122810e391dc4c09958bba1303a226103218b1c79710

  • SHA512

    1dbaeaa5855fca79ddb44f0570e5e4282347919d1629d32a6df1f9bce0f198e38ebb461f68518754116a3fa650e6e4f9541ff09ca067b10218962c162fd7ef99

  • SSDEEP

    98304:Vbbzx+3YGfZNMGFWmkukCbYvziRNPRmB58hSKHO:Vd+1RNXFWuksaf7

Malware Config

Targets

    • Target

      AimWare.exe

    • Size

      3.9MB

    • MD5

      3fc02228a6229bc91c086bc24899361b

    • SHA1

      3d33e93f771a1c77f2f01c2e15d52307f88d3bf0

    • SHA256

      34be0ed06faf7cf7e8af122810e391dc4c09958bba1303a226103218b1c79710

    • SHA512

      1dbaeaa5855fca79ddb44f0570e5e4282347919d1629d32a6df1f9bce0f198e38ebb461f68518754116a3fa650e6e4f9541ff09ca067b10218962c162fd7ef99

    • SSDEEP

      98304:Vbbzx+3YGfZNMGFWmkukCbYvziRNPRmB58hSKHO:Vd+1RNXFWuksaf7

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • UAC bypass

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Disables Task Manager via registry modification

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks