General

  • Target

    JaffaCakes118_b1b53bfb3eb96f58f1772cf35db12598b4cdcc1e9f34850f968939c56ee10b3d

  • Size

    1.3MB

  • Sample

    241221-22cm9ssrc1

  • MD5

    8a99f0ae8b3d6c02c4c9396bbb7d79a9

  • SHA1

    f5d1d261d27ba7efe0c4a63809a9b78c49e7433b

  • SHA256

    b1b53bfb3eb96f58f1772cf35db12598b4cdcc1e9f34850f968939c56ee10b3d

  • SHA512

    de97435f508d5ca4ae734d58a2c05c48710c629644cd706cf4a5c5b0da3d574fe9fc206fb130e64e42a882c6e91ec9b7702d707d47cba9d0a5580ffd65dd9b56

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Malware Config

Targets

    • Target

      JaffaCakes118_b1b53bfb3eb96f58f1772cf35db12598b4cdcc1e9f34850f968939c56ee10b3d

    • Size

      1.3MB

    • MD5

      8a99f0ae8b3d6c02c4c9396bbb7d79a9

    • SHA1

      f5d1d261d27ba7efe0c4a63809a9b78c49e7433b

    • SHA256

      b1b53bfb3eb96f58f1772cf35db12598b4cdcc1e9f34850f968939c56ee10b3d

    • SHA512

      de97435f508d5ca4ae734d58a2c05c48710c629644cd706cf4a5c5b0da3d574fe9fc206fb130e64e42a882c6e91ec9b7702d707d47cba9d0a5580ffd65dd9b56

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks