General
-
Target
JaffaCakes118_b7311d131ab874825da5928a354972e5b32da3141df9bf9d78a094e3370fb3fd
-
Size
1.3MB
-
Sample
241222-haztyaxmht
-
MD5
6882d7590ce435dbd4b1e5d0455b3022
-
SHA1
6bf6f5e4cee4808a7fe492a3fa9c3a5d30fa0d18
-
SHA256
b7311d131ab874825da5928a354972e5b32da3141df9bf9d78a094e3370fb3fd
-
SHA512
540ae6eb394ffc2c42af7f4fb67696c999bc48b637ee0cf1b97d326f14a1fab7406220306a29bba9241ff0a15dcf44530d20d60d05bf12bc0f561089f62a6d4f
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
JaffaCakes118_b7311d131ab874825da5928a354972e5b32da3141df9bf9d78a094e3370fb3fd.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_b7311d131ab874825da5928a354972e5b32da3141df9bf9d78a094e3370fb3fd.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
JaffaCakes118_b7311d131ab874825da5928a354972e5b32da3141df9bf9d78a094e3370fb3fd
-
Size
1.3MB
-
MD5
6882d7590ce435dbd4b1e5d0455b3022
-
SHA1
6bf6f5e4cee4808a7fe492a3fa9c3a5d30fa0d18
-
SHA256
b7311d131ab874825da5928a354972e5b32da3141df9bf9d78a094e3370fb3fd
-
SHA512
540ae6eb394ffc2c42af7f4fb67696c999bc48b637ee0cf1b97d326f14a1fab7406220306a29bba9241ff0a15dcf44530d20d60d05bf12bc0f561089f62a6d4f
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-