General
-
Target
JaffaCakes118_feca5a6857901f8f9e0496719755acbe7cd6d105f65e8bb7b0df37c744c59a40
-
Size
1.3MB
-
Sample
241221-2z57sssqg1
-
MD5
5ad2673c0573ea72978834b4a379a2b5
-
SHA1
4119147e9fc4ec242d5995ae8e74fa7c1406efb2
-
SHA256
feca5a6857901f8f9e0496719755acbe7cd6d105f65e8bb7b0df37c744c59a40
-
SHA512
43ae93776d47001d27a792efd528277b6c15fe4a037f501a23fab4dac4757b7edbe5f70be4b79f4bb6cedaecb145d39dddca7e079212d32270fd60784380eaa9
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
JaffaCakes118_feca5a6857901f8f9e0496719755acbe7cd6d105f65e8bb7b0df37c744c59a40.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_feca5a6857901f8f9e0496719755acbe7cd6d105f65e8bb7b0df37c744c59a40.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
JaffaCakes118_feca5a6857901f8f9e0496719755acbe7cd6d105f65e8bb7b0df37c744c59a40
-
Size
1.3MB
-
MD5
5ad2673c0573ea72978834b4a379a2b5
-
SHA1
4119147e9fc4ec242d5995ae8e74fa7c1406efb2
-
SHA256
feca5a6857901f8f9e0496719755acbe7cd6d105f65e8bb7b0df37c744c59a40
-
SHA512
43ae93776d47001d27a792efd528277b6c15fe4a037f501a23fab4dac4757b7edbe5f70be4b79f4bb6cedaecb145d39dddca7e079212d32270fd60784380eaa9
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-