General
-
Target
JaffaCakes118_91d9d67227c81cb0d52b18527e3b3ddfcb7771074bed26d199cc5a72e3c23fac
-
Size
1.3MB
-
Sample
241222-fldpqsvldm
-
MD5
2b3532278eec1474768d5daab9d03c18
-
SHA1
73bb8367091326f97ab49b74507bd982bed40c52
-
SHA256
91d9d67227c81cb0d52b18527e3b3ddfcb7771074bed26d199cc5a72e3c23fac
-
SHA512
0d070c28e3086a0307461acadafcbd5b2ff1f90bf7c5c04303357882f450bae5e3d3dce043f04ff807b3574b50d995710cd7580e8b89d394ac40892ea68880d0
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
JaffaCakes118_91d9d67227c81cb0d52b18527e3b3ddfcb7771074bed26d199cc5a72e3c23fac.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_91d9d67227c81cb0d52b18527e3b3ddfcb7771074bed26d199cc5a72e3c23fac.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
JaffaCakes118_91d9d67227c81cb0d52b18527e3b3ddfcb7771074bed26d199cc5a72e3c23fac
-
Size
1.3MB
-
MD5
2b3532278eec1474768d5daab9d03c18
-
SHA1
73bb8367091326f97ab49b74507bd982bed40c52
-
SHA256
91d9d67227c81cb0d52b18527e3b3ddfcb7771074bed26d199cc5a72e3c23fac
-
SHA512
0d070c28e3086a0307461acadafcbd5b2ff1f90bf7c5c04303357882f450bae5e3d3dce043f04ff807b3574b50d995710cd7580e8b89d394ac40892ea68880d0
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-