General

  • Target

    JaffaCakes118_acec4b47400be22ff71705ddc58db03a4727060ec9e021894651ed8abb681351

  • Size

    1.3MB

  • Sample

    241222-cxvwlszmhk

  • MD5

    7372ccb0ea82d0b8bd73ee2255522c5c

  • SHA1

    0286c116782cf98a8d88c0e1ba26c7a269bacfe3

  • SHA256

    acec4b47400be22ff71705ddc58db03a4727060ec9e021894651ed8abb681351

  • SHA512

    451b22184e30c995f1180e54bc16200c421f3965aa6c26dae7a238fcbf75d94f93740e639b92c460743fdba5c1aed654eb09600fc71ee67994c3a2498b80820b

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Malware Config

Targets

    • Target

      JaffaCakes118_acec4b47400be22ff71705ddc58db03a4727060ec9e021894651ed8abb681351

    • Size

      1.3MB

    • MD5

      7372ccb0ea82d0b8bd73ee2255522c5c

    • SHA1

      0286c116782cf98a8d88c0e1ba26c7a269bacfe3

    • SHA256

      acec4b47400be22ff71705ddc58db03a4727060ec9e021894651ed8abb681351

    • SHA512

      451b22184e30c995f1180e54bc16200c421f3965aa6c26dae7a238fcbf75d94f93740e639b92c460743fdba5c1aed654eb09600fc71ee67994c3a2498b80820b

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks