General
-
Target
AIMWARE CRACK 1.3.2.zip
-
Size
2.5MB
-
Sample
250130-p57atstmbp
-
MD5
f2f8e9a42f2d748634945575c9e95ca2
-
SHA1
11eaa418a2741ad9b0180e264f6181296d2d6671
-
SHA256
8eb06dad988d3f594456a66f1a72ae4ef2fb55b6c59488e5d77df1190e7a6446
-
SHA512
a38fb4139ab7feba9839caabd2c382fb351a8153bc0882196bd2aef64b2468108ad9cdeac796bf1ef7d72f6205a83c0d6a64bbc0f0cb37adab4717cd83dbd8ea
-
SSDEEP
49152:OVWS1cW+8XzxRxNoeJlAg9u2+Lnh6bXgZFRVmH2lv0cKEmMzeeAEpxorlnZvm1y:OVWSfNsg9uNKXM3mH25EuFAEpxoxxmU
Static task
static1
Behavioral task
behavioral1
Sample
AIMWARE CRACK 1.3.2.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
AIMWARE CRACK 1.3.2.exe
Resource
win10v2004-20250129-en
Malware Config
Targets
-
-
Target
AIMWARE CRACK 1.3.2.exe
-
Size
2.5MB
-
MD5
f72fe0fbd65b2cc0376fc1d08813a512
-
SHA1
da68c3a1f66bde61c2b7bac27c1418261b0b9e1d
-
SHA256
09f319c554e4e5468ddae84384983edc21aff8717fc103a0cee62e132c70a6d3
-
SHA512
17f0ef497ab31ee122bd4377dcf6d4319b3937e08b818cb67890b62eb0caa0dff8810318b49b16fff470a99f17acc17eba3c1ea013acb4bd0d36d402e06d698d
-
SSDEEP
49152:S3KYg14K5F/STt1piw5bpMK31jZSDW0Pg3nM0n4oyy0cz8F0yqAoThNSi:S67n5pw1pdbKwjZSDW0Pg31X0q8FTqA2
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
DCRat payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-