General

  • Target

    JaffaCakes118_7a458f5bbee90c6e7fba8a9f0fc9d6b4d8280af77d8a0d3e3ca2376cf3d51dd6

  • Size

    1.3MB

  • Sample

    241222-1qspnszpcw

  • MD5

    b80be84bec484f9e9f2eb97d3d3c6e74

  • SHA1

    86e3589a318d90def838a97617b71942a5b137d4

  • SHA256

    7a458f5bbee90c6e7fba8a9f0fc9d6b4d8280af77d8a0d3e3ca2376cf3d51dd6

  • SHA512

    03e46991d0ee64d702486cdb46af23eac91d3041e94779f09490b691904484afd0e4cbc2f29cab4341b7476096dca1cf034b91fd2fde649a856f900befc95389

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Malware Config

Targets

    • Target

      JaffaCakes118_7a458f5bbee90c6e7fba8a9f0fc9d6b4d8280af77d8a0d3e3ca2376cf3d51dd6

    • Size

      1.3MB

    • MD5

      b80be84bec484f9e9f2eb97d3d3c6e74

    • SHA1

      86e3589a318d90def838a97617b71942a5b137d4

    • SHA256

      7a458f5bbee90c6e7fba8a9f0fc9d6b4d8280af77d8a0d3e3ca2376cf3d51dd6

    • SHA512

      03e46991d0ee64d702486cdb46af23eac91d3041e94779f09490b691904484afd0e4cbc2f29cab4341b7476096dca1cf034b91fd2fde649a856f900befc95389

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks