General

  • Target

    c76615b8f581aaaf477d84be98e8ea7c_JaffaCakes118

  • Size

    1.1MB

  • Sample

    241205-m723saxpaq

  • MD5

    c76615b8f581aaaf477d84be98e8ea7c

  • SHA1

    b5c19a63af315762dee75232fc29862255ef87a9

  • SHA256

    22d63d9860fa09c5f5c6a6900aee81a8f0bdaf0647892d300d949c7116ebc354

  • SHA512

    2d159441ca886fbb35e1a1c6acb6203c5efe4944759d87e157f7507967eb1b1f0a0fb14fd27c280f45c1a715212aa7c5fc9e87606ec9420efbf5b3510a92dc2c

  • SSDEEP

    24576:foVOdgE22Jlx52AdzNYBO7X6zOTYqVJ7dmnhRVxOWF0+4:1gqx5rgO790e8Dn

Malware Config

Targets

    • Target

      c76615b8f581aaaf477d84be98e8ea7c_JaffaCakes118

    • Size

      1.1MB

    • MD5

      c76615b8f581aaaf477d84be98e8ea7c

    • SHA1

      b5c19a63af315762dee75232fc29862255ef87a9

    • SHA256

      22d63d9860fa09c5f5c6a6900aee81a8f0bdaf0647892d300d949c7116ebc354

    • SHA512

      2d159441ca886fbb35e1a1c6acb6203c5efe4944759d87e157f7507967eb1b1f0a0fb14fd27c280f45c1a715212aa7c5fc9e87606ec9420efbf5b3510a92dc2c

    • SSDEEP

      24576:foVOdgE22Jlx52AdzNYBO7X6zOTYqVJ7dmnhRVxOWF0+4:1gqx5rgO790e8Dn

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks