General
-
Target
JaffaCakes118_4ae33cae4341e6aec82d49653a498f26264734527571c61386a40215b4aaaa11
-
Size
1.3MB
-
Sample
241222-yb6lwaxldl
-
MD5
094d2cb319f98577ac7b3ef1f3b6a299
-
SHA1
a982e74596a5b8ba7dff0769ac24a7e4e1a2c9cb
-
SHA256
4ae33cae4341e6aec82d49653a498f26264734527571c61386a40215b4aaaa11
-
SHA512
3b5180bf2e1127e424d7327b6ac0d7bb6c2e880a91e93ce73313303b60301591d701c3b7f0a476042cd230dd7e62e3cd1edd20c13b1e5aacae670abb74941673
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
JaffaCakes118_4ae33cae4341e6aec82d49653a498f26264734527571c61386a40215b4aaaa11.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_4ae33cae4341e6aec82d49653a498f26264734527571c61386a40215b4aaaa11.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
JaffaCakes118_4ae33cae4341e6aec82d49653a498f26264734527571c61386a40215b4aaaa11
-
Size
1.3MB
-
MD5
094d2cb319f98577ac7b3ef1f3b6a299
-
SHA1
a982e74596a5b8ba7dff0769ac24a7e4e1a2c9cb
-
SHA256
4ae33cae4341e6aec82d49653a498f26264734527571c61386a40215b4aaaa11
-
SHA512
3b5180bf2e1127e424d7327b6ac0d7bb6c2e880a91e93ce73313303b60301591d701c3b7f0a476042cd230dd7e62e3cd1edd20c13b1e5aacae670abb74941673
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-