General

  • Target

    JaffaCakes118_cb1321012aaf0cc017623305a80e835860d4134c58bb1fa2bdd8cdeb4a4b67b1

  • Size

    1.3MB

  • Sample

    241221-z7x52sznfv

  • MD5

    84630579c8a690fdf22aea8bba6f0485

  • SHA1

    e06223db90b361ab179b43815b7a99589cd0ed1f

  • SHA256

    cb1321012aaf0cc017623305a80e835860d4134c58bb1fa2bdd8cdeb4a4b67b1

  • SHA512

    7747c77cf3184d9eb5b3116e916c591d865a7b9c36b9c9f24550cf7811e0970db4f5b2b5396f207f263aefe29b9db4b44125cc6f55960712f1c83aebfc8103a5

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Malware Config

Targets

    • Target

      JaffaCakes118_cb1321012aaf0cc017623305a80e835860d4134c58bb1fa2bdd8cdeb4a4b67b1

    • Size

      1.3MB

    • MD5

      84630579c8a690fdf22aea8bba6f0485

    • SHA1

      e06223db90b361ab179b43815b7a99589cd0ed1f

    • SHA256

      cb1321012aaf0cc017623305a80e835860d4134c58bb1fa2bdd8cdeb4a4b67b1

    • SHA512

      7747c77cf3184d9eb5b3116e916c591d865a7b9c36b9c9f24550cf7811e0970db4f5b2b5396f207f263aefe29b9db4b44125cc6f55960712f1c83aebfc8103a5

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks