General

  • Target

    JaffaCakes118_f31e2a85b52a7fe60a58fd8e4961c970adaea94c36565599ea37647bff58b36a

  • Size

    1.3MB

  • Sample

    241222-mmj2gavke1

  • MD5

    c5f1e7d1410a3d4ae4a7c83167b47257

  • SHA1

    def7ae0016c46e84a69a00384aece244030e3d96

  • SHA256

    f31e2a85b52a7fe60a58fd8e4961c970adaea94c36565599ea37647bff58b36a

  • SHA512

    fbaf603b117788200e25098ed6f1f9ec48b0086128236d8981b7d670f6cda62dbe231be77bf042376cebae5d9b7d83c7fb9907e9e0cb1215b43a864e38043deb

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Malware Config

Targets

    • Target

      JaffaCakes118_f31e2a85b52a7fe60a58fd8e4961c970adaea94c36565599ea37647bff58b36a

    • Size

      1.3MB

    • MD5

      c5f1e7d1410a3d4ae4a7c83167b47257

    • SHA1

      def7ae0016c46e84a69a00384aece244030e3d96

    • SHA256

      f31e2a85b52a7fe60a58fd8e4961c970adaea94c36565599ea37647bff58b36a

    • SHA512

      fbaf603b117788200e25098ed6f1f9ec48b0086128236d8981b7d670f6cda62dbe231be77bf042376cebae5d9b7d83c7fb9907e9e0cb1215b43a864e38043deb

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks