General
-
Target
10aed7c9078642756495f27e3b622a47_JaffaCakes118
-
Size
912KB
-
Sample
240328-1gbpsshh72
-
MD5
10aed7c9078642756495f27e3b622a47
-
SHA1
d6aa65bb11cb728c38b472150e45d8ae4fe93711
-
SHA256
621f8b48e6cd5586e3dfb5f83a24998de6903a73e6c818ad663b036f0de93250
-
SHA512
fa12a498b9849769dfe10141faaf0414acc82c79fa935fbdae17e848bb60de6d4494b52cd31f9627ec18886b469ee85ec11b0d514b244442a9966e37d4146148
-
SSDEEP
12288:zwQRFBuIllEteYHMrYE6Oc+k1xdfatF0IaLHX8lO/MDFvNKqn4:zt4IUtwr6B+uxdfatG/TeFVK+4
Behavioral task
behavioral1
Sample
10aed7c9078642756495f27e3b622a47_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
10aed7c9078642756495f27e3b622a47_JaffaCakes118.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
10aed7c9078642756495f27e3b622a47_JaffaCakes118
-
Size
912KB
-
MD5
10aed7c9078642756495f27e3b622a47
-
SHA1
d6aa65bb11cb728c38b472150e45d8ae4fe93711
-
SHA256
621f8b48e6cd5586e3dfb5f83a24998de6903a73e6c818ad663b036f0de93250
-
SHA512
fa12a498b9849769dfe10141faaf0414acc82c79fa935fbdae17e848bb60de6d4494b52cd31f9627ec18886b469ee85ec11b0d514b244442a9966e37d4146148
-
SSDEEP
12288:zwQRFBuIllEteYHMrYE6Oc+k1xdfatF0IaLHX8lO/MDFvNKqn4:zt4IUtwr6B+uxdfatG/TeFVK+4
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops file in System32 directory
-