General

  • Target

    JaffaCakes118_0dd2a55a8e463c858a928eba2949c622f10ff77f3209c1428a6ccc10e3c2b693

  • Size

    1.3MB

  • Sample

    241222-gb4zlswmbk

  • MD5

    b7e9d643bca72180c6c2723fc56b6a14

  • SHA1

    7d204dc2db6274ea22475a5e2537db97bdcef4d4

  • SHA256

    0dd2a55a8e463c858a928eba2949c622f10ff77f3209c1428a6ccc10e3c2b693

  • SHA512

    64451465f0a42524c90028cea1e4c03a9e93c1c985e7d343265e9c15e6c935215033b99ab729a4df603c9e4c66a551ea68f07e475685319cd46e5383f9bdc5bf

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Malware Config

Targets

    • Target

      JaffaCakes118_0dd2a55a8e463c858a928eba2949c622f10ff77f3209c1428a6ccc10e3c2b693

    • Size

      1.3MB

    • MD5

      b7e9d643bca72180c6c2723fc56b6a14

    • SHA1

      7d204dc2db6274ea22475a5e2537db97bdcef4d4

    • SHA256

      0dd2a55a8e463c858a928eba2949c622f10ff77f3209c1428a6ccc10e3c2b693

    • SHA512

      64451465f0a42524c90028cea1e4c03a9e93c1c985e7d343265e9c15e6c935215033b99ab729a4df603c9e4c66a551ea68f07e475685319cd46e5383f9bdc5bf

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks