General
-
Target
nixwar crack (infected).7z
-
Size
2.1MB
-
Sample
250121-a879zaxqgj
-
MD5
8b0a7c3ae0f84ae3804372cf25708544
-
SHA1
cbb429ad58c9d5dbb589210644ea90770003e87d
-
SHA256
5bd525310bcd5c98592f1ccfc15b9d2b6b60dedb381e99028712381ac7bfec02
-
SHA512
d723818811562670351476dcc0a8edb71bb49f837cd873f848549d42985940805b871862d808ca286b3e8e3aa0dbadf1d8799cae32e0eab5a4a80ce780e4e98e
-
SSDEEP
49152:lXUGJpY+CUjUs2D9dr5fNdtnWEzJe0kYq1pOWfD:lk0Y+bSLFfMEzXzub
Behavioral task
behavioral1
Sample
nixwar crack.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
nixwar crack.exe
-
Size
2.8MB
-
MD5
dccac8ad9d669af1e2010c4fc3117987
-
SHA1
60abbe80a65eae70681d56968890e99d961c9a56
-
SHA256
667d56e9383d71602c4424914cbf6a058ba54aaadf3f4bdca96b9f0b3f98472a
-
SHA512
3955087f29d372af583609e692882c192b7dd04395f439d588d662b2ab6f5a08079983617d1809dd93d978670eb9de57462a22ef6103cb5edd9454d376058f32
-
SSDEEP
49152:UbA30ONOGoXs9oflUvpWz6325lgtXl4BhqrlR5D9LY0WVV:Ub6Ws9oflEWstV46rTrLY0WVV
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-