General
-
Target
JaffaCakes118_68063e81bbc6cc2ab1008ecf20874cd586ea19e9089a47b31774bd6f098a70f7
-
Size
1.3MB
-
Sample
241222-cpdblazjhk
-
MD5
176353b465e93b4a549997d5ddbd0fd5
-
SHA1
d19097a3003ed7da6f4e5024f2554cd03a151d3c
-
SHA256
68063e81bbc6cc2ab1008ecf20874cd586ea19e9089a47b31774bd6f098a70f7
-
SHA512
e3ebf57b5bbe449f8092f04a35a629a3c72fcf6113365128ba1e19770b2eef7be08b2b3e7bd2bd824bf33d7ec8f31e84ae37044b7cd847c1871f70db02f43305
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
JaffaCakes118_68063e81bbc6cc2ab1008ecf20874cd586ea19e9089a47b31774bd6f098a70f7.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_68063e81bbc6cc2ab1008ecf20874cd586ea19e9089a47b31774bd6f098a70f7.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
JaffaCakes118_68063e81bbc6cc2ab1008ecf20874cd586ea19e9089a47b31774bd6f098a70f7
-
Size
1.3MB
-
MD5
176353b465e93b4a549997d5ddbd0fd5
-
SHA1
d19097a3003ed7da6f4e5024f2554cd03a151d3c
-
SHA256
68063e81bbc6cc2ab1008ecf20874cd586ea19e9089a47b31774bd6f098a70f7
-
SHA512
e3ebf57b5bbe449f8092f04a35a629a3c72fcf6113365128ba1e19770b2eef7be08b2b3e7bd2bd824bf33d7ec8f31e84ae37044b7cd847c1871f70db02f43305
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-