General

  • Target

    JaffaCakes118_b91e8b04d99020301229aa39b570ca8a3a251bdebe3fe768f5cc45e990ba3dbf

  • Size

    1.3MB

  • Sample

    241221-1jy8wazqe1

  • MD5

    1beee4c12afe60b5fbbd867cd11b4160

  • SHA1

    1c4295d12a686fefddf61cc47304e75e49e9270a

  • SHA256

    b91e8b04d99020301229aa39b570ca8a3a251bdebe3fe768f5cc45e990ba3dbf

  • SHA512

    920ed7e0478454e9e9dfdc0e2fe94055c4653500ba49ccab8bf532c01664a6396b5eb3019ceb311c269c91c995d5ff763dec01707de43302b39c360c65356eaa

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Malware Config

Targets

    • Target

      JaffaCakes118_b91e8b04d99020301229aa39b570ca8a3a251bdebe3fe768f5cc45e990ba3dbf

    • Size

      1.3MB

    • MD5

      1beee4c12afe60b5fbbd867cd11b4160

    • SHA1

      1c4295d12a686fefddf61cc47304e75e49e9270a

    • SHA256

      b91e8b04d99020301229aa39b570ca8a3a251bdebe3fe768f5cc45e990ba3dbf

    • SHA512

      920ed7e0478454e9e9dfdc0e2fe94055c4653500ba49ccab8bf532c01664a6396b5eb3019ceb311c269c91c995d5ff763dec01707de43302b39c360c65356eaa

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks