General

  • Target

    JaffaCakes118_0136482f6cf9dcac53ee46773d2931b47a4d771defaf6f8c31c25e472e8efdf4

  • Size

    1.3MB

  • Sample

    241222-hzq84ayqaj

  • MD5

    57eaa9c4d117c8e89480d176f27a4094

  • SHA1

    72e7458be801a9d6eb06b9c03be7eb23311e08b2

  • SHA256

    0136482f6cf9dcac53ee46773d2931b47a4d771defaf6f8c31c25e472e8efdf4

  • SHA512

    a3aa6d9ad5ab1321f72bed788825659c579f7fc1698b27dcad408348b6b66c787be27844a6c337479be4318141ffa92f70bb5a3d6c159ba03292a614be0c771e

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Malware Config

Targets

    • Target

      JaffaCakes118_0136482f6cf9dcac53ee46773d2931b47a4d771defaf6f8c31c25e472e8efdf4

    • Size

      1.3MB

    • MD5

      57eaa9c4d117c8e89480d176f27a4094

    • SHA1

      72e7458be801a9d6eb06b9c03be7eb23311e08b2

    • SHA256

      0136482f6cf9dcac53ee46773d2931b47a4d771defaf6f8c31c25e472e8efdf4

    • SHA512

      a3aa6d9ad5ab1321f72bed788825659c579f7fc1698b27dcad408348b6b66c787be27844a6c337479be4318141ffa92f70bb5a3d6c159ba03292a614be0c771e

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks