General

  • Target

    AIMWARE CRACK 1.3.2.zip

  • Size

    2.5MB

  • Sample

    250130-p57atstmbp

  • MD5

    f2f8e9a42f2d748634945575c9e95ca2

  • SHA1

    11eaa418a2741ad9b0180e264f6181296d2d6671

  • SHA256

    8eb06dad988d3f594456a66f1a72ae4ef2fb55b6c59488e5d77df1190e7a6446

  • SHA512

    a38fb4139ab7feba9839caabd2c382fb351a8153bc0882196bd2aef64b2468108ad9cdeac796bf1ef7d72f6205a83c0d6a64bbc0f0cb37adab4717cd83dbd8ea

  • SSDEEP

    49152:OVWS1cW+8XzxRxNoeJlAg9u2+Lnh6bXgZFRVmH2lv0cKEmMzeeAEpxorlnZvm1y:OVWSfNsg9uNKXM3mH25EuFAEpxoxxmU

Malware Config

Targets

    • Target

      AIMWARE CRACK 1.3.2.exe

    • Size

      2.5MB

    • MD5

      f72fe0fbd65b2cc0376fc1d08813a512

    • SHA1

      da68c3a1f66bde61c2b7bac27c1418261b0b9e1d

    • SHA256

      09f319c554e4e5468ddae84384983edc21aff8717fc103a0cee62e132c70a6d3

    • SHA512

      17f0ef497ab31ee122bd4377dcf6d4319b3937e08b818cb67890b62eb0caa0dff8810318b49b16fff470a99f17acc17eba3c1ea013acb4bd0d36d402e06d698d

    • SSDEEP

      49152:S3KYg14K5F/STt1piw5bpMK31jZSDW0Pg3nM0n4oyy0cz8F0yqAoThNSi:S67n5pw1pdbKwjZSDW0Pg31X0q8FTqA2

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • DCRat payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks