General
-
Target
50887c3ed5676401f9cab09d742bbce4.exe
-
Size
827KB
-
Sample
250109-z93tbatmhm
-
MD5
50887c3ed5676401f9cab09d742bbce4
-
SHA1
1e4016e50cffe51614df5a31817d50de7b85af26
-
SHA256
a22e4b92ef53c22a69ef02fa17403fcdf74d3c4b3efc8d28604040286f4cdedf
-
SHA512
bd8ec53d02ba47c8656c4260d2112f50755526898b681d1affbd50a6bdda69f01fa78d091ff812d3a25454afd03eca815fea7b869f037b4f492b1d188f376ab2
-
SSDEEP
12288:2NultHBphsl8LvoS8wXO0DzXLYFlTvyk31:ZHBp+ovohwDeTv131
Behavioral task
behavioral1
Sample
50887c3ed5676401f9cab09d742bbce4.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
50887c3ed5676401f9cab09d742bbce4.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
50887c3ed5676401f9cab09d742bbce4.exe
-
Size
827KB
-
MD5
50887c3ed5676401f9cab09d742bbce4
-
SHA1
1e4016e50cffe51614df5a31817d50de7b85af26
-
SHA256
a22e4b92ef53c22a69ef02fa17403fcdf74d3c4b3efc8d28604040286f4cdedf
-
SHA512
bd8ec53d02ba47c8656c4260d2112f50755526898b681d1affbd50a6bdda69f01fa78d091ff812d3a25454afd03eca815fea7b869f037b4f492b1d188f376ab2
-
SSDEEP
12288:2NultHBphsl8LvoS8wXO0DzXLYFlTvyk31:ZHBp+ovohwDeTv131
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-