General

  • Target

    JaffaCakes118_15964da8c9f56f5edbd540702028c5df94b401d1d68891f54fbf02aa2b82ce16

  • Size

    1.3MB

  • Sample

    241222-emxcssspfs

  • MD5

    afdd8b1e3323c50e4f4f3b3ca9140764

  • SHA1

    2f16c7660b3e59885cf6f000e85603148141c295

  • SHA256

    15964da8c9f56f5edbd540702028c5df94b401d1d68891f54fbf02aa2b82ce16

  • SHA512

    024e842b090f70523eb7b71755253d8160104d6831508491506f01c4eb7dd452af13083957b77e13cf283c43bf62399eb3875a993d0eeb21de28fcc38aedde01

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Malware Config

Targets

    • Target

      JaffaCakes118_15964da8c9f56f5edbd540702028c5df94b401d1d68891f54fbf02aa2b82ce16

    • Size

      1.3MB

    • MD5

      afdd8b1e3323c50e4f4f3b3ca9140764

    • SHA1

      2f16c7660b3e59885cf6f000e85603148141c295

    • SHA256

      15964da8c9f56f5edbd540702028c5df94b401d1d68891f54fbf02aa2b82ce16

    • SHA512

      024e842b090f70523eb7b71755253d8160104d6831508491506f01c4eb7dd452af13083957b77e13cf283c43bf62399eb3875a993d0eeb21de28fcc38aedde01

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks