General

  • Target

    8eda5e69afffb4296509516af4e6d35b_JaffaCakes118

  • Size

    1.0MB

  • Sample

    241104-dpgvfs1nay

  • MD5

    8eda5e69afffb4296509516af4e6d35b

  • SHA1

    eca88c2f22ea72e6949cd386019bacfdd09ce4db

  • SHA256

    22cd06e32db67b2a913ac6b2a4b6c28e1e255f4a37e2b1ff98aea7a6232cc483

  • SHA512

    128624639dd6f9ce649059f142f891da016ad0fa9cead3259278f1be4c4a4e602a6d554290b2ae82045570ce8d1a4860cd38743d28297e8fa3c9788a51eb1bc4

  • SSDEEP

    24576:B2G/nvxW3WUhrJYtHKkTo24gSzSRhCP1GGGqsu:BbA3ZhrJcqCHgek1GVy

Malware Config

Targets

    • Target

      8eda5e69afffb4296509516af4e6d35b_JaffaCakes118

    • Size

      1.0MB

    • MD5

      8eda5e69afffb4296509516af4e6d35b

    • SHA1

      eca88c2f22ea72e6949cd386019bacfdd09ce4db

    • SHA256

      22cd06e32db67b2a913ac6b2a4b6c28e1e255f4a37e2b1ff98aea7a6232cc483

    • SHA512

      128624639dd6f9ce649059f142f891da016ad0fa9cead3259278f1be4c4a4e602a6d554290b2ae82045570ce8d1a4860cd38743d28297e8fa3c9788a51eb1bc4

    • SSDEEP

      24576:B2G/nvxW3WUhrJYtHKkTo24gSzSRhCP1GGGqsu:BbA3ZhrJcqCHgek1GVy

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Disables Task Manager via registry modification

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks