General

  • Target

    e8317caac6568f4d37d8535a1e56ad29_JaffaCakes118

  • Size

    493KB

  • Sample

    240408-xtqgyacd7x

  • MD5

    e8317caac6568f4d37d8535a1e56ad29

  • SHA1

    f0fd94999b1f177a9c356fe7d5d51ff67b57bd43

  • SHA256

    905fc6297517e940e073d09037ea044f2ba0ecf95f728abae8199bcc0ee2142d

  • SHA512

    339ba4b8ad3187845252d4397781db24e6334d5389437ca6b38132f96ea9d68651d05bb6fe6bf40a91e4398f2faaf73e5eae5d2345a747815f39bb6e946b1834

  • SSDEEP

    6144:7qqDLOObBf5tUgvk+HyxcQFcUdMOMJa1DHjzCytSi2OFbJKnblNGaN+SZxh8D5m5:2qnOO9BtqxcwdhrjzzcOlWkSZ3y5UB

Malware Config

Targets

    • Target

      e8317caac6568f4d37d8535a1e56ad29_JaffaCakes118

    • Size

      493KB

    • MD5

      e8317caac6568f4d37d8535a1e56ad29

    • SHA1

      f0fd94999b1f177a9c356fe7d5d51ff67b57bd43

    • SHA256

      905fc6297517e940e073d09037ea044f2ba0ecf95f728abae8199bcc0ee2142d

    • SHA512

      339ba4b8ad3187845252d4397781db24e6334d5389437ca6b38132f96ea9d68651d05bb6fe6bf40a91e4398f2faaf73e5eae5d2345a747815f39bb6e946b1834

    • SSDEEP

      6144:7qqDLOObBf5tUgvk+HyxcQFcUdMOMJa1DHjzCytSi2OFbJKnblNGaN+SZxh8D5m5:2qnOO9BtqxcwdhrjzzcOlWkSZ3y5UB

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks