General

  • Target

    JaffaCakes118_b9b1d46f5ef9a676331d644c13e9ef39343626f65ad7f9de6d6fab72c8e88c96

  • Size

    1.3MB

  • Sample

    241222-lc2cbssqhq

  • MD5

    aaa7591f953631f4399267ee585b3f31

  • SHA1

    d52debcd371446f9d1c6c3a6f619901b58169402

  • SHA256

    b9b1d46f5ef9a676331d644c13e9ef39343626f65ad7f9de6d6fab72c8e88c96

  • SHA512

    6c07e4fd7b6aa7f3b3fb9e482344281eabcd99a0e5c6924f02116eebc3e4cb70dd729865308a2b539e620bba207c5c6fdc934c651a28ec3787723efc5cf22c12

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Malware Config

Targets

    • Target

      JaffaCakes118_b9b1d46f5ef9a676331d644c13e9ef39343626f65ad7f9de6d6fab72c8e88c96

    • Size

      1.3MB

    • MD5

      aaa7591f953631f4399267ee585b3f31

    • SHA1

      d52debcd371446f9d1c6c3a6f619901b58169402

    • SHA256

      b9b1d46f5ef9a676331d644c13e9ef39343626f65ad7f9de6d6fab72c8e88c96

    • SHA512

      6c07e4fd7b6aa7f3b3fb9e482344281eabcd99a0e5c6924f02116eebc3e4cb70dd729865308a2b539e620bba207c5c6fdc934c651a28ec3787723efc5cf22c12

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks