General

  • Target

    JaffaCakes118_d19b2dd4f28348f4d96ed1fb9c9beb32cda9d5e3b7adc3e476e33f47b9072413

  • Size

    1.3MB

  • Sample

    241222-1gsy3szlfx

  • MD5

    a27a81c22b49aa80b27ff875be43948d

  • SHA1

    d63e2a6b68582d8d3da3e7e1f8f98919336c9e23

  • SHA256

    d19b2dd4f28348f4d96ed1fb9c9beb32cda9d5e3b7adc3e476e33f47b9072413

  • SHA512

    09e431375191f3e7ca433219ed8a831bcd74a1410b5899ea67e19e1406edc098b0526439d22e9d5411f062ab38890bcc10eba4d0666a1a608121cd077c5eeb2e

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Malware Config

Targets

    • Target

      JaffaCakes118_d19b2dd4f28348f4d96ed1fb9c9beb32cda9d5e3b7adc3e476e33f47b9072413

    • Size

      1.3MB

    • MD5

      a27a81c22b49aa80b27ff875be43948d

    • SHA1

      d63e2a6b68582d8d3da3e7e1f8f98919336c9e23

    • SHA256

      d19b2dd4f28348f4d96ed1fb9c9beb32cda9d5e3b7adc3e476e33f47b9072413

    • SHA512

      09e431375191f3e7ca433219ed8a831bcd74a1410b5899ea67e19e1406edc098b0526439d22e9d5411f062ab38890bcc10eba4d0666a1a608121cd077c5eeb2e

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks