General
-
Target
JaffaCakes118_f90f860388af1ae2c16fe96bb867f7865ffc69b1d8f15ecd6c290e1e27cdf2bb
-
Size
1.3MB
-
Sample
241221-2npqnsslbz
-
MD5
6e65a9d47e169820e505543778e973b7
-
SHA1
9df8e259f3b00d6c8b79f16e379470396083fc29
-
SHA256
f90f860388af1ae2c16fe96bb867f7865ffc69b1d8f15ecd6c290e1e27cdf2bb
-
SHA512
bdc7cea8d0d5726c529f2f00dd09a1f120a5f0c34574ad62dc71a76a651667c6bbc85c0a3341f67a6ec472edb2bc9cea42bb3102046e7a38e92df1272f05f92d
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
JaffaCakes118_f90f860388af1ae2c16fe96bb867f7865ffc69b1d8f15ecd6c290e1e27cdf2bb.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_f90f860388af1ae2c16fe96bb867f7865ffc69b1d8f15ecd6c290e1e27cdf2bb.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
JaffaCakes118_f90f860388af1ae2c16fe96bb867f7865ffc69b1d8f15ecd6c290e1e27cdf2bb
-
Size
1.3MB
-
MD5
6e65a9d47e169820e505543778e973b7
-
SHA1
9df8e259f3b00d6c8b79f16e379470396083fc29
-
SHA256
f90f860388af1ae2c16fe96bb867f7865ffc69b1d8f15ecd6c290e1e27cdf2bb
-
SHA512
bdc7cea8d0d5726c529f2f00dd09a1f120a5f0c34574ad62dc71a76a651667c6bbc85c0a3341f67a6ec472edb2bc9cea42bb3102046e7a38e92df1272f05f92d
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-