General

  • Target

    JaffaCakes118_192c2f7937e658b60aee6d98975e5592c71db56b4be8eff8ebccebddc9bb68cc

  • Size

    1.3MB

  • Sample

    241222-danpfs1jhj

  • MD5

    d9d54b4d94e335a973d0d80c81782e6a

  • SHA1

    fcb6f39d6c2f68cc5aafa56932347692315bd2f4

  • SHA256

    192c2f7937e658b60aee6d98975e5592c71db56b4be8eff8ebccebddc9bb68cc

  • SHA512

    93b02c7fc75802d63a93560fa8c07c8588cd0299304db0ba47ce2d1c849f372a108148c1b2d88f27e3a36c6770b928d18e3b809f011c451f2e818ee4294c5465

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Malware Config

Targets

    • Target

      JaffaCakes118_192c2f7937e658b60aee6d98975e5592c71db56b4be8eff8ebccebddc9bb68cc

    • Size

      1.3MB

    • MD5

      d9d54b4d94e335a973d0d80c81782e6a

    • SHA1

      fcb6f39d6c2f68cc5aafa56932347692315bd2f4

    • SHA256

      192c2f7937e658b60aee6d98975e5592c71db56b4be8eff8ebccebddc9bb68cc

    • SHA512

      93b02c7fc75802d63a93560fa8c07c8588cd0299304db0ba47ce2d1c849f372a108148c1b2d88f27e3a36c6770b928d18e3b809f011c451f2e818ee4294c5465

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks