General
-
Target
c697f3001198246fe1a1d2494a0ff2ee_JaffaCakes118
-
Size
1.4MB
-
Sample
241205-jbmrfavjft
-
MD5
c697f3001198246fe1a1d2494a0ff2ee
-
SHA1
0505a546298ff2a17d510387a1060ab3f44112e7
-
SHA256
250196616e509add44f0e1dec8e4e1b515ef52df9a6e3f569ee0fe7c80a13914
-
SHA512
24b7723c24a8687ad152dacad7b0ea52dc8500c1f6a727eb26d4f8015ef91f56d3e8d1cc5d3d0f11ac9101934ccb814d620f0806941f22c809dbad6dee4cb042
-
SSDEEP
24576:u2G/nvxW3WieCjbsHd2vNn2LRLpapqDTmRf9KrFnbkW9zdAZeSGhl6C+4Q:ubA3jnvNn2LIqH4S/g9GhwVt
Behavioral task
behavioral1
Sample
c697f3001198246fe1a1d2494a0ff2ee_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c697f3001198246fe1a1d2494a0ff2ee_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
c697f3001198246fe1a1d2494a0ff2ee_JaffaCakes118
-
Size
1.4MB
-
MD5
c697f3001198246fe1a1d2494a0ff2ee
-
SHA1
0505a546298ff2a17d510387a1060ab3f44112e7
-
SHA256
250196616e509add44f0e1dec8e4e1b515ef52df9a6e3f569ee0fe7c80a13914
-
SHA512
24b7723c24a8687ad152dacad7b0ea52dc8500c1f6a727eb26d4f8015ef91f56d3e8d1cc5d3d0f11ac9101934ccb814d620f0806941f22c809dbad6dee4cb042
-
SSDEEP
24576:u2G/nvxW3WieCjbsHd2vNn2LRLpapqDTmRf9KrFnbkW9zdAZeSGhl6C+4Q:ubA3jnvNn2LIqH4S/g9GhwVt
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Disables Task Manager via registry modification
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1