General
-
Target
e8317caac6568f4d37d8535a1e56ad29_JaffaCakes118
-
Size
493KB
-
Sample
240408-xtqgyacd7x
-
MD5
e8317caac6568f4d37d8535a1e56ad29
-
SHA1
f0fd94999b1f177a9c356fe7d5d51ff67b57bd43
-
SHA256
905fc6297517e940e073d09037ea044f2ba0ecf95f728abae8199bcc0ee2142d
-
SHA512
339ba4b8ad3187845252d4397781db24e6334d5389437ca6b38132f96ea9d68651d05bb6fe6bf40a91e4398f2faaf73e5eae5d2345a747815f39bb6e946b1834
-
SSDEEP
6144:7qqDLOObBf5tUgvk+HyxcQFcUdMOMJa1DHjzCytSi2OFbJKnblNGaN+SZxh8D5m5:2qnOO9BtqxcwdhrjzzcOlWkSZ3y5UB
Behavioral task
behavioral1
Sample
e8317caac6568f4d37d8535a1e56ad29_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
e8317caac6568f4d37d8535a1e56ad29_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
e8317caac6568f4d37d8535a1e56ad29_JaffaCakes118
-
Size
493KB
-
MD5
e8317caac6568f4d37d8535a1e56ad29
-
SHA1
f0fd94999b1f177a9c356fe7d5d51ff67b57bd43
-
SHA256
905fc6297517e940e073d09037ea044f2ba0ecf95f728abae8199bcc0ee2142d
-
SHA512
339ba4b8ad3187845252d4397781db24e6334d5389437ca6b38132f96ea9d68651d05bb6fe6bf40a91e4398f2faaf73e5eae5d2345a747815f39bb6e946b1834
-
SSDEEP
6144:7qqDLOObBf5tUgvk+HyxcQFcUdMOMJa1DHjzCytSi2OFbJKnblNGaN+SZxh8D5m5:2qnOO9BtqxcwdhrjzzcOlWkSZ3y5UB
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops file in System32 directory
-