General

  • Target

    c6982dc10689d7adf79787926edf776e_JaffaCakes118

  • Size

    1.2MB

  • Sample

    241205-jbsmpazrcq

  • MD5

    c6982dc10689d7adf79787926edf776e

  • SHA1

    3a115b5b8787cb176ef70bc988ae9897e70d80ec

  • SHA256

    2bb8943bef96d003b1b51b52a218d03bac6c81084a1f867915a43e1220fc95fb

  • SHA512

    ea6669d48e60971d55097ff2a18d5d05c810bd55d23720e1fc1efc220ebe8d642b24164079b41a9f1160a1f91e64ccddf84a58060ed565b030871fb2f4ec059e

  • SSDEEP

    24576:fW8bqLVRGZ38MKO2rxTX/0x7OHJAPwPB/E685kEScmgu2renXZ:fDSzGZLKOgzsVw5tE5mSeX

Malware Config

Targets

    • Target

      c6982dc10689d7adf79787926edf776e_JaffaCakes118

    • Size

      1.2MB

    • MD5

      c6982dc10689d7adf79787926edf776e

    • SHA1

      3a115b5b8787cb176ef70bc988ae9897e70d80ec

    • SHA256

      2bb8943bef96d003b1b51b52a218d03bac6c81084a1f867915a43e1220fc95fb

    • SHA512

      ea6669d48e60971d55097ff2a18d5d05c810bd55d23720e1fc1efc220ebe8d642b24164079b41a9f1160a1f91e64ccddf84a58060ed565b030871fb2f4ec059e

    • SSDEEP

      24576:fW8bqLVRGZ38MKO2rxTX/0x7OHJAPwPB/E685kEScmgu2renXZ:fDSzGZLKOgzsVw5tE5mSeX

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks