General
-
Target
JaffaCakes118_45a347a1436bbef8295f9ce15b78708ec11f5c567a39db32df15503b06ab8d02
-
Size
1.3MB
-
Sample
241222-k4n1mssnbp
-
MD5
524eeb5190eea493300469e693861b15
-
SHA1
45eab03308d7806bdc302d5e8a16cab5b5d8f463
-
SHA256
45a347a1436bbef8295f9ce15b78708ec11f5c567a39db32df15503b06ab8d02
-
SHA512
f22775fbcaae5502336f6eaf0dd477912e73944e14fe9da5ed735eaf1d6cf6b1ef576c044787a7b18a1885037588acad343bc9809c6489fd34ddd2f9c489c829
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
JaffaCakes118_45a347a1436bbef8295f9ce15b78708ec11f5c567a39db32df15503b06ab8d02.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
JaffaCakes118_45a347a1436bbef8295f9ce15b78708ec11f5c567a39db32df15503b06ab8d02.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
JaffaCakes118_45a347a1436bbef8295f9ce15b78708ec11f5c567a39db32df15503b06ab8d02
-
Size
1.3MB
-
MD5
524eeb5190eea493300469e693861b15
-
SHA1
45eab03308d7806bdc302d5e8a16cab5b5d8f463
-
SHA256
45a347a1436bbef8295f9ce15b78708ec11f5c567a39db32df15503b06ab8d02
-
SHA512
f22775fbcaae5502336f6eaf0dd477912e73944e14fe9da5ed735eaf1d6cf6b1ef576c044787a7b18a1885037588acad343bc9809c6489fd34ddd2f9c489c829
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-