General
-
Target
050f95f53cfe505258bacecc315055a80d61188127430c6c078ec4730869405e
-
Size
1.3MB
-
Sample
230203-lbbehshb3y
-
MD5
bb032d77190a98820331cfd60e051e26
-
SHA1
b6b4e88d497bfb13ff22448f4851d1b38c40477b
-
SHA256
050f95f53cfe505258bacecc315055a80d61188127430c6c078ec4730869405e
-
SHA512
31c1c2c31bbf8f4032ed1d8b26bea015501f2d07c380d2016712e92beb9e2527db59614c5814e5f81e7027bed793d763a751d8d754bbfcf5c5da9f9082e68719
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
050f95f53cfe505258bacecc315055a80d61188127430c6c078ec4730869405e.exe
Resource
win10-20220812-en
Malware Config
Targets
-
-
Target
050f95f53cfe505258bacecc315055a80d61188127430c6c078ec4730869405e
-
Size
1.3MB
-
MD5
bb032d77190a98820331cfd60e051e26
-
SHA1
b6b4e88d497bfb13ff22448f4851d1b38c40477b
-
SHA256
050f95f53cfe505258bacecc315055a80d61188127430c6c078ec4730869405e
-
SHA512
31c1c2c31bbf8f4032ed1d8b26bea015501f2d07c380d2016712e92beb9e2527db59614c5814e5f81e7027bed793d763a751d8d754bbfcf5c5da9f9082e68719
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-