General
-
Target
JaffaCakes118_a72df599b77dfbe58c07f58ffde681cb8de2de035bc967a4961c57007fe247b5
-
Size
1.3MB
-
Sample
241222-h7jh8aypey
-
MD5
f78f7a3c8a3ee285dede42389a3fb450
-
SHA1
66e820b3aeef849339632b03e32d3e3d1239f295
-
SHA256
a72df599b77dfbe58c07f58ffde681cb8de2de035bc967a4961c57007fe247b5
-
SHA512
3e843bc84847d48d0b719cceb730189bb0d6ba2121461ba016c78463410c1a51b50aebda6fcbc89e31fd23e3ebd0bb65897f666c5f2f2daadbe98537742dd4a6
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
JaffaCakes118_a72df599b77dfbe58c07f58ffde681cb8de2de035bc967a4961c57007fe247b5.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_a72df599b77dfbe58c07f58ffde681cb8de2de035bc967a4961c57007fe247b5.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
JaffaCakes118_a72df599b77dfbe58c07f58ffde681cb8de2de035bc967a4961c57007fe247b5
-
Size
1.3MB
-
MD5
f78f7a3c8a3ee285dede42389a3fb450
-
SHA1
66e820b3aeef849339632b03e32d3e3d1239f295
-
SHA256
a72df599b77dfbe58c07f58ffde681cb8de2de035bc967a4961c57007fe247b5
-
SHA512
3e843bc84847d48d0b719cceb730189bb0d6ba2121461ba016c78463410c1a51b50aebda6fcbc89e31fd23e3ebd0bb65897f666c5f2f2daadbe98537742dd4a6
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-