General

  • Target

    JaffaCakes118_366bbe6fce1ca7967c69bc2d0727e5d85db3410d0590322518aeccacc94be1a3

  • Size

    1.3MB

  • Sample

    241222-kpczts1rhp

  • MD5

    776b7b5288172dc0d90e99b63fe7ea36

  • SHA1

    38c663a2786bd633ec2671d8a4c9a95b8c12ac01

  • SHA256

    366bbe6fce1ca7967c69bc2d0727e5d85db3410d0590322518aeccacc94be1a3

  • SHA512

    34868b0ae3b1509de9f034c689e9decb24df2ec18d8a5434a272c5eba99362d642737f3af9a0db210fee301f79fb83f523978bd110f5a201c134a134747f7d0a

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Malware Config

Targets

    • Target

      JaffaCakes118_366bbe6fce1ca7967c69bc2d0727e5d85db3410d0590322518aeccacc94be1a3

    • Size

      1.3MB

    • MD5

      776b7b5288172dc0d90e99b63fe7ea36

    • SHA1

      38c663a2786bd633ec2671d8a4c9a95b8c12ac01

    • SHA256

      366bbe6fce1ca7967c69bc2d0727e5d85db3410d0590322518aeccacc94be1a3

    • SHA512

      34868b0ae3b1509de9f034c689e9decb24df2ec18d8a5434a272c5eba99362d642737f3af9a0db210fee301f79fb83f523978bd110f5a201c134a134747f7d0a

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks