General

  • Target

    JaffaCakes118_594536a61315c65d76f40bb0141af43b119e74fe8621f1891d8cca8fbce404b7

  • Size

    1.3MB

  • Sample

    241222-l3gevatmgv

  • MD5

    2e1c9d5a758940815db9c3979575d371

  • SHA1

    cddcfb554ccab40d8cf50b21a5d14ddf165c3d4a

  • SHA256

    594536a61315c65d76f40bb0141af43b119e74fe8621f1891d8cca8fbce404b7

  • SHA512

    3600bc20f12240833a85b97ed641ce5fe59cd74b16690c3f413e7070bd42c5e97628cb3289819337963a927f73dd85d8596f4e3198c79a1144b96329c1d906d1

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Malware Config

Targets

    • Target

      JaffaCakes118_594536a61315c65d76f40bb0141af43b119e74fe8621f1891d8cca8fbce404b7

    • Size

      1.3MB

    • MD5

      2e1c9d5a758940815db9c3979575d371

    • SHA1

      cddcfb554ccab40d8cf50b21a5d14ddf165c3d4a

    • SHA256

      594536a61315c65d76f40bb0141af43b119e74fe8621f1891d8cca8fbce404b7

    • SHA512

      3600bc20f12240833a85b97ed641ce5fe59cd74b16690c3f413e7070bd42c5e97628cb3289819337963a927f73dd85d8596f4e3198c79a1144b96329c1d906d1

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks