General
-
Target
JaffaCakes118_b1b53bfb3eb96f58f1772cf35db12598b4cdcc1e9f34850f968939c56ee10b3d
-
Size
1.3MB
-
Sample
241221-22cm9ssrc1
-
MD5
8a99f0ae8b3d6c02c4c9396bbb7d79a9
-
SHA1
f5d1d261d27ba7efe0c4a63809a9b78c49e7433b
-
SHA256
b1b53bfb3eb96f58f1772cf35db12598b4cdcc1e9f34850f968939c56ee10b3d
-
SHA512
de97435f508d5ca4ae734d58a2c05c48710c629644cd706cf4a5c5b0da3d574fe9fc206fb130e64e42a882c6e91ec9b7702d707d47cba9d0a5580ffd65dd9b56
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
JaffaCakes118_b1b53bfb3eb96f58f1772cf35db12598b4cdcc1e9f34850f968939c56ee10b3d.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
JaffaCakes118_b1b53bfb3eb96f58f1772cf35db12598b4cdcc1e9f34850f968939c56ee10b3d.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
JaffaCakes118_b1b53bfb3eb96f58f1772cf35db12598b4cdcc1e9f34850f968939c56ee10b3d
-
Size
1.3MB
-
MD5
8a99f0ae8b3d6c02c4c9396bbb7d79a9
-
SHA1
f5d1d261d27ba7efe0c4a63809a9b78c49e7433b
-
SHA256
b1b53bfb3eb96f58f1772cf35db12598b4cdcc1e9f34850f968939c56ee10b3d
-
SHA512
de97435f508d5ca4ae734d58a2c05c48710c629644cd706cf4a5c5b0da3d574fe9fc206fb130e64e42a882c6e91ec9b7702d707d47cba9d0a5580ffd65dd9b56
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-