General

  • Target

    JaffaCakes118_a1519652a67217ce1a3f1740d900812df90b0030f60fcbc0f016281859a6f58d

  • Size

    1.3MB

  • Sample

    241222-a71thawpat

  • MD5

    366a7ae7c55ba1cd3d612e46e499632a

  • SHA1

    627ffd536380ae01581eb631d5b7066b4d4c2b52

  • SHA256

    a1519652a67217ce1a3f1740d900812df90b0030f60fcbc0f016281859a6f58d

  • SHA512

    84347fd0b4c09b1ce496c41b6f22e6efe68e4df0c8e516be127227c8647d53472ad688b18300166d2fab6ffb4fb724c4416ffec7b1b38a727708185285cd4de4

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Malware Config

Targets

    • Target

      JaffaCakes118_a1519652a67217ce1a3f1740d900812df90b0030f60fcbc0f016281859a6f58d

    • Size

      1.3MB

    • MD5

      366a7ae7c55ba1cd3d612e46e499632a

    • SHA1

      627ffd536380ae01581eb631d5b7066b4d4c2b52

    • SHA256

      a1519652a67217ce1a3f1740d900812df90b0030f60fcbc0f016281859a6f58d

    • SHA512

      84347fd0b4c09b1ce496c41b6f22e6efe68e4df0c8e516be127227c8647d53472ad688b18300166d2fab6ffb4fb724c4416ffec7b1b38a727708185285cd4de4

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks