General

  • Target

    JaffaCakes118_8cf65aae79c9cf7ccf9a19c7ce0ec303dd6f4a9a8bbf20b7e403045947cbfb10

  • Size

    1.3MB

  • Sample

    241221-3mnyestpdt

  • MD5

    5640397c2dc4126d8af56d4832b5f2b4

  • SHA1

    e302ef6e8f2cb2c4529007f54a983e35a617bfdb

  • SHA256

    8cf65aae79c9cf7ccf9a19c7ce0ec303dd6f4a9a8bbf20b7e403045947cbfb10

  • SHA512

    5e85460d4f8d2419c64d88d57e1c0c44f0f7a7262b2d355cf8daeda42833e889ea87a633ba8972df081030ca5386adced61a0c8bc84fc2ae79c9f1d5d876b282

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Malware Config

Targets

    • Target

      JaffaCakes118_8cf65aae79c9cf7ccf9a19c7ce0ec303dd6f4a9a8bbf20b7e403045947cbfb10

    • Size

      1.3MB

    • MD5

      5640397c2dc4126d8af56d4832b5f2b4

    • SHA1

      e302ef6e8f2cb2c4529007f54a983e35a617bfdb

    • SHA256

      8cf65aae79c9cf7ccf9a19c7ce0ec303dd6f4a9a8bbf20b7e403045947cbfb10

    • SHA512

      5e85460d4f8d2419c64d88d57e1c0c44f0f7a7262b2d355cf8daeda42833e889ea87a633ba8972df081030ca5386adced61a0c8bc84fc2ae79c9f1d5d876b282

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks