General
-
Target
JaffaCakes118_60d8e73a791882333ba7c35de391863b33e3f7f873fd7d89b9afa5b0225eac43
-
Size
1.3MB
-
Sample
241222-a5fqjswqcj
-
MD5
f837438076c31b473a7e5d9aa65aca7f
-
SHA1
04f7f9142bcf479df0443266bd0a66e360b5fbf4
-
SHA256
60d8e73a791882333ba7c35de391863b33e3f7f873fd7d89b9afa5b0225eac43
-
SHA512
928f5d609a93efaaf66f9487df05ec1c654be9a8d10ebcd46c60d42aae619c760d306d46a9e1c6e8dd08f1723e056a9e5f3bac9ed6b91a6a8bb967ac5cc4a53e
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
JaffaCakes118_60d8e73a791882333ba7c35de391863b33e3f7f873fd7d89b9afa5b0225eac43.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_60d8e73a791882333ba7c35de391863b33e3f7f873fd7d89b9afa5b0225eac43.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
JaffaCakes118_60d8e73a791882333ba7c35de391863b33e3f7f873fd7d89b9afa5b0225eac43
-
Size
1.3MB
-
MD5
f837438076c31b473a7e5d9aa65aca7f
-
SHA1
04f7f9142bcf479df0443266bd0a66e360b5fbf4
-
SHA256
60d8e73a791882333ba7c35de391863b33e3f7f873fd7d89b9afa5b0225eac43
-
SHA512
928f5d609a93efaaf66f9487df05ec1c654be9a8d10ebcd46c60d42aae619c760d306d46a9e1c6e8dd08f1723e056a9e5f3bac9ed6b91a6a8bb967ac5cc4a53e
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-