General

  • Target

    JaffaCakes118_2678d73de83a16be14491e7fc19a5a99ad3872882cae66438f6efba4dd9e17d9

  • Size

    1.3MB

  • Sample

    241222-e32x8atnbm

  • MD5

    865e6e9a2a96cd876b9330cc9052b273

  • SHA1

    b7aa443ec13990b80d1f1fdf25dcb5deaf39be89

  • SHA256

    2678d73de83a16be14491e7fc19a5a99ad3872882cae66438f6efba4dd9e17d9

  • SHA512

    94dd27b4eff6465fcb7d7ceadf47eccfad22d6b0b7d701fd215eb5864fea75cc30c688ad96cbbecf2efa60620b5ec8af5400021ae5e0446bbf3265683379e566

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Malware Config

Targets

    • Target

      JaffaCakes118_2678d73de83a16be14491e7fc19a5a99ad3872882cae66438f6efba4dd9e17d9

    • Size

      1.3MB

    • MD5

      865e6e9a2a96cd876b9330cc9052b273

    • SHA1

      b7aa443ec13990b80d1f1fdf25dcb5deaf39be89

    • SHA256

      2678d73de83a16be14491e7fc19a5a99ad3872882cae66438f6efba4dd9e17d9

    • SHA512

      94dd27b4eff6465fcb7d7ceadf47eccfad22d6b0b7d701fd215eb5864fea75cc30c688ad96cbbecf2efa60620b5ec8af5400021ae5e0446bbf3265683379e566

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks