General
-
Target
Aimware Crack.rar
-
Size
1.8MB
-
Sample
250204-tw5g4atmal
-
MD5
36eff860bc7ad4295bdbbfdd6540d338
-
SHA1
6d9d4c84a5ebc0346104088394a4f192f664f9fe
-
SHA256
757ee1a84e2fab2908f8bef7d8d65afbb206691c6d755252cf36a6c0060f59bd
-
SHA512
6dc1b85f9a7739a8dfbe1c05913571895b01a73f52da5c1f9db1c1c1f492ce9dc661836e576c85e1e5b3a2d9d4741ec14848b7ddb05da96f7af6e22b442de2c4
-
SSDEEP
49152:/lzD/3yF9Sr+mbQOMgoxN2P8svmAM7ewAC3vv/O3TfyoL:/lP/3y6rJsOFfvNIXACmDfyg
Static task
static1
Behavioral task
behavioral1
Sample
Aimware Crack.rar
Resource
win10v2004-20250129-en
Malware Config
Targets
-
-
Target
Aimware Crack.rar
-
Size
1.8MB
-
MD5
36eff860bc7ad4295bdbbfdd6540d338
-
SHA1
6d9d4c84a5ebc0346104088394a4f192f664f9fe
-
SHA256
757ee1a84e2fab2908f8bef7d8d65afbb206691c6d755252cf36a6c0060f59bd
-
SHA512
6dc1b85f9a7739a8dfbe1c05913571895b01a73f52da5c1f9db1c1c1f492ce9dc661836e576c85e1e5b3a2d9d4741ec14848b7ddb05da96f7af6e22b442de2c4
-
SSDEEP
49152:/lzD/3yF9Sr+mbQOMgoxN2P8svmAM7ewAC3vv/O3TfyoL:/lP/3y6rJsOFfvNIXACmDfyg
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Modifies WinLogon for persistence
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1