General

  • Target

    JaffaCakes118_50e084f718746b0599c5cfc48f8e86032d24a3f9e29d716533b205cad3cabd91

  • Size

    1.3MB

  • Sample

    241221-19sh1ssjcl

  • MD5

    ef34fc6d3f55b68d4c5ec2fe4f86204b

  • SHA1

    07c79d701c1cc7d7e0a71e9010f2d4905bdd1b3b

  • SHA256

    50e084f718746b0599c5cfc48f8e86032d24a3f9e29d716533b205cad3cabd91

  • SHA512

    d0c4e4dee957c9456ef88f93ef73355e803a0a558342cbbf38e989f94f29aa16221ed87902a05a6e8e6df7dc46f61ea53887cdfb90bbcc4139a57376574d09fb

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Malware Config

Targets

    • Target

      JaffaCakes118_50e084f718746b0599c5cfc48f8e86032d24a3f9e29d716533b205cad3cabd91

    • Size

      1.3MB

    • MD5

      ef34fc6d3f55b68d4c5ec2fe4f86204b

    • SHA1

      07c79d701c1cc7d7e0a71e9010f2d4905bdd1b3b

    • SHA256

      50e084f718746b0599c5cfc48f8e86032d24a3f9e29d716533b205cad3cabd91

    • SHA512

      d0c4e4dee957c9456ef88f93ef73355e803a0a558342cbbf38e989f94f29aa16221ed87902a05a6e8e6df7dc46f61ea53887cdfb90bbcc4139a57376574d09fb

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks