General
-
Target
JaffaCakes118_ac18149854a481152c579b13bdebaee9c1641a17d0b3d6df4eda97cef36f7f5a
-
Size
1.3MB
-
Sample
241221-3xzsnsvmfm
-
MD5
2a8495ac26e08f6781488c83a2e2387b
-
SHA1
0fb2069d27860a6e026e60526facddadb930c538
-
SHA256
ac18149854a481152c579b13bdebaee9c1641a17d0b3d6df4eda97cef36f7f5a
-
SHA512
632022be28d88160b3665f6233e1b814d0a78bd45d7cc0a72d4ac46b2bce9e35c3e18bceeb8c87486db4f07ba647e04c9ae1397ff59b6e3251cb213c2ea23cb2
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
JaffaCakes118_ac18149854a481152c579b13bdebaee9c1641a17d0b3d6df4eda97cef36f7f5a.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_ac18149854a481152c579b13bdebaee9c1641a17d0b3d6df4eda97cef36f7f5a.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
JaffaCakes118_ac18149854a481152c579b13bdebaee9c1641a17d0b3d6df4eda97cef36f7f5a
-
Size
1.3MB
-
MD5
2a8495ac26e08f6781488c83a2e2387b
-
SHA1
0fb2069d27860a6e026e60526facddadb930c538
-
SHA256
ac18149854a481152c579b13bdebaee9c1641a17d0b3d6df4eda97cef36f7f5a
-
SHA512
632022be28d88160b3665f6233e1b814d0a78bd45d7cc0a72d4ac46b2bce9e35c3e18bceeb8c87486db4f07ba647e04c9ae1397ff59b6e3251cb213c2ea23cb2
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-