General

  • Target

    JaffaCakes118_164cf4d999d47a879ef9414aa2845fead0031237643a4765f3685a9e35b421fa

  • Size

    1.3MB

  • Sample

    241222-1dmmwszkfw

  • MD5

    2f2cf4d870dc220f5dd2f3ab765444f5

  • SHA1

    b83ef8c4aaf75e6e5374006c99a600c742f8d470

  • SHA256

    164cf4d999d47a879ef9414aa2845fead0031237643a4765f3685a9e35b421fa

  • SHA512

    904439a78407d0e9b54a295034c841f9ca54909e24e9fc41083563dda53e596436b093e408d5087a5229100b0b1225d9b15473e868d4e5f887238c3bebc53c20

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Malware Config

Targets

    • Target

      JaffaCakes118_164cf4d999d47a879ef9414aa2845fead0031237643a4765f3685a9e35b421fa

    • Size

      1.3MB

    • MD5

      2f2cf4d870dc220f5dd2f3ab765444f5

    • SHA1

      b83ef8c4aaf75e6e5374006c99a600c742f8d470

    • SHA256

      164cf4d999d47a879ef9414aa2845fead0031237643a4765f3685a9e35b421fa

    • SHA512

      904439a78407d0e9b54a295034c841f9ca54909e24e9fc41083563dda53e596436b093e408d5087a5229100b0b1225d9b15473e868d4e5f887238c3bebc53c20

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks