General
-
Target
bb2016d496611fe8cae1421d73f1756a_JaffaCakes118
-
Size
1.1MB
-
Sample
241203-bztwnayqbn
-
MD5
bb2016d496611fe8cae1421d73f1756a
-
SHA1
691fd0a996e5a8d7f725f65cc3d847f00f452140
-
SHA256
e603588520d43b42f47d9af8f74eaa70efba4fe006bd29f74ba9c28b0699128f
-
SHA512
e6e153865af8954ad91d8d30e70aaad5a2ac4eb9c1976427a2414dca5a6a30ac2f59bba5d56a1e109805b4a0b6e17024f016c6577d247bf131b95b0a1ce9290a
-
SSDEEP
12288:p9F7wFaFs+9bwsvIi4XqWtgir99ELM9dqugUbSbv8yNRTHHh+XLRSecvv+Kzj11Z:pn7w8X9bweZS9KCg0Gz9NloMHFzj/1
Behavioral task
behavioral1
Sample
bb2016d496611fe8cae1421d73f1756a_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
bb2016d496611fe8cae1421d73f1756a_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
bb2016d496611fe8cae1421d73f1756a_JaffaCakes118
-
Size
1.1MB
-
MD5
bb2016d496611fe8cae1421d73f1756a
-
SHA1
691fd0a996e5a8d7f725f65cc3d847f00f452140
-
SHA256
e603588520d43b42f47d9af8f74eaa70efba4fe006bd29f74ba9c28b0699128f
-
SHA512
e6e153865af8954ad91d8d30e70aaad5a2ac4eb9c1976427a2414dca5a6a30ac2f59bba5d56a1e109805b4a0b6e17024f016c6577d247bf131b95b0a1ce9290a
-
SSDEEP
12288:p9F7wFaFs+9bwsvIi4XqWtgir99ELM9dqugUbSbv8yNRTHHh+XLRSecvv+Kzj11Z:pn7w8X9bweZS9KCg0Gz9NloMHFzj/1
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1