General

  • Target

    JaffaCakes118_42d12da824f798e6e025d672c8f56719d4c9dc7f9bc89f8723d9df0469d24bae

  • Size

    1.3MB

  • Sample

    241222-mglywatrgz

  • MD5

    2dbe5c9a6f56201a4bc0519ca6e689bb

  • SHA1

    63922b16f54dc160a7434a8358113b1d2050fbe8

  • SHA256

    42d12da824f798e6e025d672c8f56719d4c9dc7f9bc89f8723d9df0469d24bae

  • SHA512

    c0a4c289aa4d8b7b9327c783699b92317954ea18578a785d6f83b1882586dc9336c97b2a190629b44874d8207ed446ae4277ac119bed53d1ecd24ee549d8e7c3

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Malware Config

Targets

    • Target

      JaffaCakes118_42d12da824f798e6e025d672c8f56719d4c9dc7f9bc89f8723d9df0469d24bae

    • Size

      1.3MB

    • MD5

      2dbe5c9a6f56201a4bc0519ca6e689bb

    • SHA1

      63922b16f54dc160a7434a8358113b1d2050fbe8

    • SHA256

      42d12da824f798e6e025d672c8f56719d4c9dc7f9bc89f8723d9df0469d24bae

    • SHA512

      c0a4c289aa4d8b7b9327c783699b92317954ea18578a785d6f83b1882586dc9336c97b2a190629b44874d8207ed446ae4277ac119bed53d1ecd24ee549d8e7c3

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks