General
-
Target
nixware (1111).zip
-
Size
1.6MB
-
Sample
250121-azl1daxmez
-
MD5
1eb3f5ee72463b30e05d4c012b3904b4
-
SHA1
6a547655ed73a92aa31012215c0f321efb5b7efd
-
SHA256
4575b7b370f08a7a93c394c149d5e3a543befca7e88a69eb47ad21cf34dbba63
-
SHA512
acccb5595509f35bd02cbe59c7b9d7ff07bb935d1ec795f83f81a16c4ec6d2634b5796de71e4a30d4669a976d99bc46deb9da4b63297e2878e3b0cdb7a9bb181
-
SSDEEP
49152:P+KdvNJ2at5bTc1x1DrKHFijS0QBDrXcs/wm:Gq2P9PmPhYm
Static task
static1
Behavioral task
behavioral1
Sample
nixware.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
nixware.bat
-
Size
31.6MB
-
MD5
d0781ada3269f987c794530ff0506cd7
-
SHA1
adf41b03527fa9689951f17f0ae78f9de857a294
-
SHA256
f33a361478ccaf4357b7b8eb2ba785669cff5c22325de0287430e75d5a8826c8
-
SHA512
f86e0a0fa7c9979b73dbb74611704a29e7e585a2b23ef64ac268ad19b6d1dd446b1d822384ff1a24d1dd4de48da3b5d2952c7e80dcc2072d29e12fcd7103faa1
-
SSDEEP
24576:wTbBv5rUWed4A4kaY+Rv9HpWYAzA3K0UYGDRMo4I+J6UPoy5CTEjroZKpazt1tff:iBNpApOVz5CTEjroZm47SFdVDHNhsZ
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1