General
-
Target
TearWeapon.exe
-
Size
1.1MB
-
Sample
241130-v14xsszlaz
-
MD5
0c3a6b0190475de988ebaf0d788ae934
-
SHA1
b611c57d25b733277fee96395bc2140c1b06b166
-
SHA256
2d7c923ab1e4849fd6897512ea7763bbe2b8b12f58267d277ca7953f8fc08c86
-
SHA512
b43c50a7e81924cd874c89a3084b42e45c41c95f1647da7848d901cc2279801c7f12b73fdd2c988bc1e528b63e249fac1941d3cc48aa699b6214247196a27d14
-
SSDEEP
24576:U2G/nvxW3Ww0t16ZauSTtl1GuZZDZoL60:UbA301Tz1t2z
Behavioral task
behavioral1
Sample
TearWeapon.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
TearWeapon.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
TearWeapon.exe
-
Size
1.1MB
-
MD5
0c3a6b0190475de988ebaf0d788ae934
-
SHA1
b611c57d25b733277fee96395bc2140c1b06b166
-
SHA256
2d7c923ab1e4849fd6897512ea7763bbe2b8b12f58267d277ca7953f8fc08c86
-
SHA512
b43c50a7e81924cd874c89a3084b42e45c41c95f1647da7848d901cc2279801c7f12b73fdd2c988bc1e528b63e249fac1941d3cc48aa699b6214247196a27d14
-
SSDEEP
24576:U2G/nvxW3Ww0t16ZauSTtl1GuZZDZoL60:UbA301Tz1t2z
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-