General
-
Target
JaffaCakes118_5199c025c06349e9dd74ea1ce0cf84a5d6a3395cf957abee8867304e4c1f3206
-
Size
1.3MB
-
Sample
241222-fsntaavlht
-
MD5
40af0e69287b52f2597b2a3e675d1c54
-
SHA1
29184e10147734a79764753ed6572e07bb00e568
-
SHA256
5199c025c06349e9dd74ea1ce0cf84a5d6a3395cf957abee8867304e4c1f3206
-
SHA512
fc815e2d130575eefe82ae46bcf78fbc9c6c4ae639850c5d2845f1a9d1f5adf33dfb34101e3eebb4ec487f105fd91acafeac2f33f5d0634a60ebabe08cbba789
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
JaffaCakes118_5199c025c06349e9dd74ea1ce0cf84a5d6a3395cf957abee8867304e4c1f3206.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_5199c025c06349e9dd74ea1ce0cf84a5d6a3395cf957abee8867304e4c1f3206.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
JaffaCakes118_5199c025c06349e9dd74ea1ce0cf84a5d6a3395cf957abee8867304e4c1f3206
-
Size
1.3MB
-
MD5
40af0e69287b52f2597b2a3e675d1c54
-
SHA1
29184e10147734a79764753ed6572e07bb00e568
-
SHA256
5199c025c06349e9dd74ea1ce0cf84a5d6a3395cf957abee8867304e4c1f3206
-
SHA512
fc815e2d130575eefe82ae46bcf78fbc9c6c4ae639850c5d2845f1a9d1f5adf33dfb34101e3eebb4ec487f105fd91acafeac2f33f5d0634a60ebabe08cbba789
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-