General

  • Target

    7533ed2a304c4822335ace29d3fbfd08_JaffaCakes118

  • Size

    598KB

  • Sample

    240726-w2celszcnd

  • MD5

    7533ed2a304c4822335ace29d3fbfd08

  • SHA1

    870ad473904ed8466d2d53642ed42f8bad1afc76

  • SHA256

    1624432ef21c3f80e457d520420c001b415eb8fecff45bbd7cb8960bd6b995c9

  • SHA512

    6172d9811c054d881134911bb46d1c3c8d5b736b2a52d963c328806f65ea67bd449b3618ea6bda41e91dcb3d9de7f7946ac58756066351fb60b0f0c2570e139f

  • SSDEEP

    12288:HP+l1iJUOtVAzoHnNIHMiViofc5lWRxDkpa1KeJa+7H1QnfO9W:voiaAKkKHMiV45lWfkpar1

Malware Config

Targets

    • Target

      7533ed2a304c4822335ace29d3fbfd08_JaffaCakes118

    • Size

      598KB

    • MD5

      7533ed2a304c4822335ace29d3fbfd08

    • SHA1

      870ad473904ed8466d2d53642ed42f8bad1afc76

    • SHA256

      1624432ef21c3f80e457d520420c001b415eb8fecff45bbd7cb8960bd6b995c9

    • SHA512

      6172d9811c054d881134911bb46d1c3c8d5b736b2a52d963c328806f65ea67bd449b3618ea6bda41e91dcb3d9de7f7946ac58756066351fb60b0f0c2570e139f

    • SSDEEP

      12288:HP+l1iJUOtVAzoHnNIHMiViofc5lWRxDkpa1KeJa+7H1QnfO9W:voiaAKkKHMiV45lWfkpar1

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks