General
-
Target
JaffaCakes118_82c922475404a7d5d4c6744b7962f692b94750f837a98b21417dd5ef109c1a16
-
Size
1.3MB
-
Sample
241222-xgke6awmbk
-
MD5
0357c98f52b507ac83cc1a07bdeee84e
-
SHA1
92a46307d6fe7fa6ceac1238a53751a15117d178
-
SHA256
82c922475404a7d5d4c6744b7962f692b94750f837a98b21417dd5ef109c1a16
-
SHA512
9bd7ecef33e88df9d3090be588636bf39c7512c301724b9ab83ea6a76632ceaef916f210813b7c991c86750573336cf776dff6406bca3c1ae90949e96c2b5a00
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
JaffaCakes118_82c922475404a7d5d4c6744b7962f692b94750f837a98b21417dd5ef109c1a16.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_82c922475404a7d5d4c6744b7962f692b94750f837a98b21417dd5ef109c1a16.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
JaffaCakes118_82c922475404a7d5d4c6744b7962f692b94750f837a98b21417dd5ef109c1a16
-
Size
1.3MB
-
MD5
0357c98f52b507ac83cc1a07bdeee84e
-
SHA1
92a46307d6fe7fa6ceac1238a53751a15117d178
-
SHA256
82c922475404a7d5d4c6744b7962f692b94750f837a98b21417dd5ef109c1a16
-
SHA512
9bd7ecef33e88df9d3090be588636bf39c7512c301724b9ab83ea6a76632ceaef916f210813b7c991c86750573336cf776dff6406bca3c1ae90949e96c2b5a00
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-