General

  • Target

    JaffaCakes118_8d6283494341b7ba5e9c8831ccca027ecccfcd6914fed48bf5346a7091df0658

  • Size

    1.3MB

  • Sample

    241222-f89exsvrex

  • MD5

    8ce8638a041c4b0de9a098a59ce956fa

  • SHA1

    ee416e7c589410c72fe4135befcebdf6af50b5c4

  • SHA256

    8d6283494341b7ba5e9c8831ccca027ecccfcd6914fed48bf5346a7091df0658

  • SHA512

    d8a0052b5035ac73c156e24aeeec7d08eabdb7d9bc706c1928165545352b66c187af233b197d80380a0694fb664fe097e38f09a254d36380759df4d0a0b8cac8

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Malware Config

Targets

    • Target

      JaffaCakes118_8d6283494341b7ba5e9c8831ccca027ecccfcd6914fed48bf5346a7091df0658

    • Size

      1.3MB

    • MD5

      8ce8638a041c4b0de9a098a59ce956fa

    • SHA1

      ee416e7c589410c72fe4135befcebdf6af50b5c4

    • SHA256

      8d6283494341b7ba5e9c8831ccca027ecccfcd6914fed48bf5346a7091df0658

    • SHA512

      d8a0052b5035ac73c156e24aeeec7d08eabdb7d9bc706c1928165545352b66c187af233b197d80380a0694fb664fe097e38f09a254d36380759df4d0a0b8cac8

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks