General

  • Target

    c697f3001198246fe1a1d2494a0ff2ee_JaffaCakes118

  • Size

    1.4MB

  • Sample

    241205-jbmrfavjft

  • MD5

    c697f3001198246fe1a1d2494a0ff2ee

  • SHA1

    0505a546298ff2a17d510387a1060ab3f44112e7

  • SHA256

    250196616e509add44f0e1dec8e4e1b515ef52df9a6e3f569ee0fe7c80a13914

  • SHA512

    24b7723c24a8687ad152dacad7b0ea52dc8500c1f6a727eb26d4f8015ef91f56d3e8d1cc5d3d0f11ac9101934ccb814d620f0806941f22c809dbad6dee4cb042

  • SSDEEP

    24576:u2G/nvxW3WieCjbsHd2vNn2LRLpapqDTmRf9KrFnbkW9zdAZeSGhl6C+4Q:ubA3jnvNn2LIqH4S/g9GhwVt

Malware Config

Targets

    • Target

      c697f3001198246fe1a1d2494a0ff2ee_JaffaCakes118

    • Size

      1.4MB

    • MD5

      c697f3001198246fe1a1d2494a0ff2ee

    • SHA1

      0505a546298ff2a17d510387a1060ab3f44112e7

    • SHA256

      250196616e509add44f0e1dec8e4e1b515ef52df9a6e3f569ee0fe7c80a13914

    • SHA512

      24b7723c24a8687ad152dacad7b0ea52dc8500c1f6a727eb26d4f8015ef91f56d3e8d1cc5d3d0f11ac9101934ccb814d620f0806941f22c809dbad6dee4cb042

    • SSDEEP

      24576:u2G/nvxW3WieCjbsHd2vNn2LRLpapqDTmRf9KrFnbkW9zdAZeSGhl6C+4Q:ubA3jnvNn2LIqH4S/g9GhwVt

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Disables Task Manager via registry modification

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks