General
-
Target
JaffaCakes118_6e9cfcb0f3e0533021bb247e7e567f1693fd685f21d1a5e2d77caf14e769fbdc
-
Size
1.3MB
-
Sample
241222-zleftayld1
-
MD5
cce749eacd4064043cc19ef974e29730
-
SHA1
e9599abdde767af6ff59f18d0738f8d0653d4116
-
SHA256
6e9cfcb0f3e0533021bb247e7e567f1693fd685f21d1a5e2d77caf14e769fbdc
-
SHA512
fea61aa3daf05ace962db08396a0970fa352d2fa5ad365c6592c764e6dd890c7767762a0fadb69cef39b431d5399877ef4c255ae9cd3cffafec31d0c634c28d8
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
JaffaCakes118_6e9cfcb0f3e0533021bb247e7e567f1693fd685f21d1a5e2d77caf14e769fbdc.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_6e9cfcb0f3e0533021bb247e7e567f1693fd685f21d1a5e2d77caf14e769fbdc.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
JaffaCakes118_6e9cfcb0f3e0533021bb247e7e567f1693fd685f21d1a5e2d77caf14e769fbdc
-
Size
1.3MB
-
MD5
cce749eacd4064043cc19ef974e29730
-
SHA1
e9599abdde767af6ff59f18d0738f8d0653d4116
-
SHA256
6e9cfcb0f3e0533021bb247e7e567f1693fd685f21d1a5e2d77caf14e769fbdc
-
SHA512
fea61aa3daf05ace962db08396a0970fa352d2fa5ad365c6592c764e6dd890c7767762a0fadb69cef39b431d5399877ef4c255ae9cd3cffafec31d0c634c28d8
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-