General

  • Target

    JaffaCakes118_6d5892bf25d15c71699d9dbad6aac93b91c3235183aba372f9a0c4cfc2a8f217

  • Size

    1.3MB

  • Sample

    241221-3fl59atphl

  • MD5

    28a24db981eb6c18a75789793b675196

  • SHA1

    ef4a25ab76d2b9122fc366e56e84a454a8323871

  • SHA256

    6d5892bf25d15c71699d9dbad6aac93b91c3235183aba372f9a0c4cfc2a8f217

  • SHA512

    059c40af42c41c8c460031f6c140bcd98f2cc741406c03d16dc21ef9af4f9712b0f1f5eaa4a2fa8631eab89c604c7a9f9b25d4a186a583a9244c4880db4a9dbe

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Malware Config

Targets

    • Target

      JaffaCakes118_6d5892bf25d15c71699d9dbad6aac93b91c3235183aba372f9a0c4cfc2a8f217

    • Size

      1.3MB

    • MD5

      28a24db981eb6c18a75789793b675196

    • SHA1

      ef4a25ab76d2b9122fc366e56e84a454a8323871

    • SHA256

      6d5892bf25d15c71699d9dbad6aac93b91c3235183aba372f9a0c4cfc2a8f217

    • SHA512

      059c40af42c41c8c460031f6c140bcd98f2cc741406c03d16dc21ef9af4f9712b0f1f5eaa4a2fa8631eab89c604c7a9f9b25d4a186a583a9244c4880db4a9dbe

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks