General

  • Target

    JaffaCakes118_d115e0a0e6e156abad894e933652dd3d2db3fbe4302f6581aaf09e353b4d3c14

  • Size

    1.3MB

  • Sample

    241222-a4lkeawmez

  • MD5

    1a7a6a2d11ad0f438ffc9c8959e90c60

  • SHA1

    42beb17e12c4b69fcc699b39781318f019b4e372

  • SHA256

    d115e0a0e6e156abad894e933652dd3d2db3fbe4302f6581aaf09e353b4d3c14

  • SHA512

    ab7e9c5bc118a705d018dffd819fbfbe853fc7d25af9a35af7589b2efa4f3934cc861937989d8a550f9b98bd307326cbe295ffad3251d9cb3c14ed4899c5eb1a

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Malware Config

Targets

    • Target

      JaffaCakes118_d115e0a0e6e156abad894e933652dd3d2db3fbe4302f6581aaf09e353b4d3c14

    • Size

      1.3MB

    • MD5

      1a7a6a2d11ad0f438ffc9c8959e90c60

    • SHA1

      42beb17e12c4b69fcc699b39781318f019b4e372

    • SHA256

      d115e0a0e6e156abad894e933652dd3d2db3fbe4302f6581aaf09e353b4d3c14

    • SHA512

      ab7e9c5bc118a705d018dffd819fbfbe853fc7d25af9a35af7589b2efa4f3934cc861937989d8a550f9b98bd307326cbe295ffad3251d9cb3c14ed4899c5eb1a

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks