General
-
Target
JaffaCakes118_552ab9c3efbb5b91780671a3df45a082a01781e73af8ab5bea9a7d6e2f726067
-
Size
1.3MB
-
Sample
241222-a7vx9awnhx
-
MD5
2be7d612fa9570d1e960dec0852392ff
-
SHA1
08860259e9c965f8b9ff1b229dce4070d425b2fd
-
SHA256
552ab9c3efbb5b91780671a3df45a082a01781e73af8ab5bea9a7d6e2f726067
-
SHA512
322357b56166e85db296775111c0d8e778d004d17035358242dac16d498e53542df63340e355cf20b14c80d033130b56b01f97e69f74288eee9abb98832f0d4e
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
JaffaCakes118_552ab9c3efbb5b91780671a3df45a082a01781e73af8ab5bea9a7d6e2f726067.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_552ab9c3efbb5b91780671a3df45a082a01781e73af8ab5bea9a7d6e2f726067.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
JaffaCakes118_552ab9c3efbb5b91780671a3df45a082a01781e73af8ab5bea9a7d6e2f726067
-
Size
1.3MB
-
MD5
2be7d612fa9570d1e960dec0852392ff
-
SHA1
08860259e9c965f8b9ff1b229dce4070d425b2fd
-
SHA256
552ab9c3efbb5b91780671a3df45a082a01781e73af8ab5bea9a7d6e2f726067
-
SHA512
322357b56166e85db296775111c0d8e778d004d17035358242dac16d498e53542df63340e355cf20b14c80d033130b56b01f97e69f74288eee9abb98832f0d4e
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-