General
-
Target
JaffaCakes118_d9d18a4d821150c07a0d09524c4e5fe7ea34a3932f891b382352c237a9794231
-
Size
1.3MB
-
Sample
241222-hlk5xsxrfs
-
MD5
6a77ded6dfbee7f26edd24c1cd3ef2e4
-
SHA1
68eaeab7239150ca236f70e3f66dc734cc830ac1
-
SHA256
d9d18a4d821150c07a0d09524c4e5fe7ea34a3932f891b382352c237a9794231
-
SHA512
66aaf96fb1e97c6b34fb40d9bb76b6633cb6979c599abc69c0b7bca91b120a3e024fec893561402da8c7d9f9de666c1198ae6047deea76d3dbad9548950a5e03
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
JaffaCakes118_d9d18a4d821150c07a0d09524c4e5fe7ea34a3932f891b382352c237a9794231.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_d9d18a4d821150c07a0d09524c4e5fe7ea34a3932f891b382352c237a9794231.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
JaffaCakes118_d9d18a4d821150c07a0d09524c4e5fe7ea34a3932f891b382352c237a9794231
-
Size
1.3MB
-
MD5
6a77ded6dfbee7f26edd24c1cd3ef2e4
-
SHA1
68eaeab7239150ca236f70e3f66dc734cc830ac1
-
SHA256
d9d18a4d821150c07a0d09524c4e5fe7ea34a3932f891b382352c237a9794231
-
SHA512
66aaf96fb1e97c6b34fb40d9bb76b6633cb6979c599abc69c0b7bca91b120a3e024fec893561402da8c7d9f9de666c1198ae6047deea76d3dbad9548950a5e03
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-