General

  • Target

    JaffaCakes118_dc8166a8baec796340ca73be826427608b6abe5faee9175636c549e676ce4ca5

  • Size

    1.3MB

  • Sample

    241222-kh38fa1qbq

  • MD5

    1985aec9f1b8c644a3a21802d647744c

  • SHA1

    d9527b9dc39857b09fa2082f376885e0df7f8233

  • SHA256

    dc8166a8baec796340ca73be826427608b6abe5faee9175636c549e676ce4ca5

  • SHA512

    9ccf97cb00948b5d3373c9fdbb311391409930697cf7ee0a44cbaa33ca92186aa435189121e0d3c73ace0950c23f0bfa96ed391265822875059c4d363411f958

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Malware Config

Targets

    • Target

      JaffaCakes118_dc8166a8baec796340ca73be826427608b6abe5faee9175636c549e676ce4ca5

    • Size

      1.3MB

    • MD5

      1985aec9f1b8c644a3a21802d647744c

    • SHA1

      d9527b9dc39857b09fa2082f376885e0df7f8233

    • SHA256

      dc8166a8baec796340ca73be826427608b6abe5faee9175636c549e676ce4ca5

    • SHA512

      9ccf97cb00948b5d3373c9fdbb311391409930697cf7ee0a44cbaa33ca92186aa435189121e0d3c73ace0950c23f0bfa96ed391265822875059c4d363411f958

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks