General
-
Target
JaffaCakes118_4def7e84aa64a60490581f43216a63e439974443bf06f1cca30daa10f5a27716
-
Size
1.3MB
-
Sample
241222-dcw4lszrfz
-
MD5
787f897ace218fac0acb509e7c3dad7d
-
SHA1
9bd24a5dc54515a98c06a4d8ff954f1a7d0c113a
-
SHA256
4def7e84aa64a60490581f43216a63e439974443bf06f1cca30daa10f5a27716
-
SHA512
57a0017bbef0f94939c1481beb7088df08d07bc8f17e326ce45608165c7925e92460a57982a2e7bb43f05b24e2986c31e2d0d9a128604d8444bc3f25a5745966
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
JaffaCakes118_4def7e84aa64a60490581f43216a63e439974443bf06f1cca30daa10f5a27716.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_4def7e84aa64a60490581f43216a63e439974443bf06f1cca30daa10f5a27716.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
JaffaCakes118_4def7e84aa64a60490581f43216a63e439974443bf06f1cca30daa10f5a27716
-
Size
1.3MB
-
MD5
787f897ace218fac0acb509e7c3dad7d
-
SHA1
9bd24a5dc54515a98c06a4d8ff954f1a7d0c113a
-
SHA256
4def7e84aa64a60490581f43216a63e439974443bf06f1cca30daa10f5a27716
-
SHA512
57a0017bbef0f94939c1481beb7088df08d07bc8f17e326ce45608165c7925e92460a57982a2e7bb43f05b24e2986c31e2d0d9a128604d8444bc3f25a5745966
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-