General
-
Target
JaffaCakes118_589e9a180cf0298086cb20205043271c7eba213c8adb8c72a6d08f7721fcb143
-
Size
1.3MB
-
Sample
241222-fxcxksvncx
-
MD5
d7da820d606011872170173938427d4e
-
SHA1
2b6fc629a5ebbd0e04d98eab8346f15cbde93f48
-
SHA256
589e9a180cf0298086cb20205043271c7eba213c8adb8c72a6d08f7721fcb143
-
SHA512
0ef21b80cfbcb8d14f0fdb3a26c49aa3ce481d48458d51b84904ae64957e097d22d7abf2370374b1111d5411422897b758618fd48cfb228c4eb19b9973ae5c13
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
JaffaCakes118_589e9a180cf0298086cb20205043271c7eba213c8adb8c72a6d08f7721fcb143.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_589e9a180cf0298086cb20205043271c7eba213c8adb8c72a6d08f7721fcb143.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
JaffaCakes118_589e9a180cf0298086cb20205043271c7eba213c8adb8c72a6d08f7721fcb143
-
Size
1.3MB
-
MD5
d7da820d606011872170173938427d4e
-
SHA1
2b6fc629a5ebbd0e04d98eab8346f15cbde93f48
-
SHA256
589e9a180cf0298086cb20205043271c7eba213c8adb8c72a6d08f7721fcb143
-
SHA512
0ef21b80cfbcb8d14f0fdb3a26c49aa3ce481d48458d51b84904ae64957e097d22d7abf2370374b1111d5411422897b758618fd48cfb228c4eb19b9973ae5c13
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-