General
-
Target
JaffaCakes118_7f92db21342747b67a1ebbf04b2dcc6586941bdbc8cf4c2bb4cff1b82ddae82a
-
Size
1.3MB
-
Sample
241222-jwjwaazrbl
-
MD5
5834dce8c271bee957548978cd9e1bbb
-
SHA1
de656cad26ec0df947746c85ec4a25db6e2b039d
-
SHA256
7f92db21342747b67a1ebbf04b2dcc6586941bdbc8cf4c2bb4cff1b82ddae82a
-
SHA512
f2539a41f49f4a572039560d6ccb6b6daa3580395645d6d76ca6dd5dac0d77fe7f23ecd309c7995f3066ce9d1d58787fa7e1cc284c23860ea5f831419a571e78
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
JaffaCakes118_7f92db21342747b67a1ebbf04b2dcc6586941bdbc8cf4c2bb4cff1b82ddae82a.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_7f92db21342747b67a1ebbf04b2dcc6586941bdbc8cf4c2bb4cff1b82ddae82a.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
JaffaCakes118_7f92db21342747b67a1ebbf04b2dcc6586941bdbc8cf4c2bb4cff1b82ddae82a
-
Size
1.3MB
-
MD5
5834dce8c271bee957548978cd9e1bbb
-
SHA1
de656cad26ec0df947746c85ec4a25db6e2b039d
-
SHA256
7f92db21342747b67a1ebbf04b2dcc6586941bdbc8cf4c2bb4cff1b82ddae82a
-
SHA512
f2539a41f49f4a572039560d6ccb6b6daa3580395645d6d76ca6dd5dac0d77fe7f23ecd309c7995f3066ce9d1d58787fa7e1cc284c23860ea5f831419a571e78
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-