General

  • Target

    JaffaCakes118_b27c1714210a2bb90dff29ee5a343c188bd53001f93b8c9cdfe473f1ed0057a4

  • Size

    1.3MB

  • Sample

    241221-3s7mqavlal

  • MD5

    d61b537c09f62e63c12ea965850e9459

  • SHA1

    4a16b1ef8fd76aa07aefe06d7ba06319e2d8246a

  • SHA256

    b27c1714210a2bb90dff29ee5a343c188bd53001f93b8c9cdfe473f1ed0057a4

  • SHA512

    7ab5862024f5f07dcf9faa5d5dd31c25a445021ee1613e3e6afa777e5b3dbf68936ef567c5f66d24363baffd92c93c8c0d623448fae6ac35485b8005ee752a7c

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Malware Config

Targets

    • Target

      JaffaCakes118_b27c1714210a2bb90dff29ee5a343c188bd53001f93b8c9cdfe473f1ed0057a4

    • Size

      1.3MB

    • MD5

      d61b537c09f62e63c12ea965850e9459

    • SHA1

      4a16b1ef8fd76aa07aefe06d7ba06319e2d8246a

    • SHA256

      b27c1714210a2bb90dff29ee5a343c188bd53001f93b8c9cdfe473f1ed0057a4

    • SHA512

      7ab5862024f5f07dcf9faa5d5dd31c25a445021ee1613e3e6afa777e5b3dbf68936ef567c5f66d24363baffd92c93c8c0d623448fae6ac35485b8005ee752a7c

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks