General
-
Target
JaffaCakes118_7eb8eb0da26c2718d0809d3ece0fdfc3e91f366e70af1440fb11237ef2a10f4d
-
Size
1.3MB
-
Sample
241222-hv9jwayldz
-
MD5
33741cf74e4b4b83a93cfcc292f68b00
-
SHA1
59deab59932e91f89ded7b1568037128845198c3
-
SHA256
7eb8eb0da26c2718d0809d3ece0fdfc3e91f366e70af1440fb11237ef2a10f4d
-
SHA512
b652a9039eab74019771b998bd544d14153d73176dfe7185a8b036035157e1a29b42cb7425b47e1b6cb563e7e266ddd1eb56bf62bfc60c73b80905a35f8d2f01
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
JaffaCakes118_7eb8eb0da26c2718d0809d3ece0fdfc3e91f366e70af1440fb11237ef2a10f4d.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_7eb8eb0da26c2718d0809d3ece0fdfc3e91f366e70af1440fb11237ef2a10f4d.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
JaffaCakes118_7eb8eb0da26c2718d0809d3ece0fdfc3e91f366e70af1440fb11237ef2a10f4d
-
Size
1.3MB
-
MD5
33741cf74e4b4b83a93cfcc292f68b00
-
SHA1
59deab59932e91f89ded7b1568037128845198c3
-
SHA256
7eb8eb0da26c2718d0809d3ece0fdfc3e91f366e70af1440fb11237ef2a10f4d
-
SHA512
b652a9039eab74019771b998bd544d14153d73176dfe7185a8b036035157e1a29b42cb7425b47e1b6cb563e7e266ddd1eb56bf62bfc60c73b80905a35f8d2f01
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-