General

  • Target

    JaffaCakes118_7c4bf30b2b629443fe82b13d0967256df330970de29a5c1d288457bbdade8d0c

  • Size

    1.3MB

  • Sample

    241222-f9vyxsvrgx

  • MD5

    aab25d785c73c3226169d35df1978db4

  • SHA1

    115205d044653e35e04dda210f6f2d6d523b78be

  • SHA256

    7c4bf30b2b629443fe82b13d0967256df330970de29a5c1d288457bbdade8d0c

  • SHA512

    a41fec43e597689f2000c863379a2df52f3e4c68935ce26948bc146da52af17397fbe5ac576d139890b3ecbd4f5c19a6938a5846bbfb588d6e73aa6c2119f26b

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Malware Config

Targets

    • Target

      JaffaCakes118_7c4bf30b2b629443fe82b13d0967256df330970de29a5c1d288457bbdade8d0c

    • Size

      1.3MB

    • MD5

      aab25d785c73c3226169d35df1978db4

    • SHA1

      115205d044653e35e04dda210f6f2d6d523b78be

    • SHA256

      7c4bf30b2b629443fe82b13d0967256df330970de29a5c1d288457bbdade8d0c

    • SHA512

      a41fec43e597689f2000c863379a2df52f3e4c68935ce26948bc146da52af17397fbe5ac576d139890b3ecbd4f5c19a6938a5846bbfb588d6e73aa6c2119f26b

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks