General

  • Target

    JaffaCakes118_c510dbb0f9d0043c4b60e4f4c407e34e329ea035aed402bd5710d239c1cadcd8

  • Size

    1.3MB

  • Sample

    241222-pbezgsxrap

  • MD5

    73d38f30aca8a28c2fa53318d62c2bfa

  • SHA1

    9122472282a6fd371f2dd03e76bed17e66d830ca

  • SHA256

    c510dbb0f9d0043c4b60e4f4c407e34e329ea035aed402bd5710d239c1cadcd8

  • SHA512

    f3be1caad7cb16fa8516bb270dc077a1f72841414484ab346344b97cbc34a63b632398c5acffe7d9f4c6fba5e686e0f8bd730a1fb21dd1bebe8803f0de065385

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Malware Config

Targets

    • Target

      JaffaCakes118_c510dbb0f9d0043c4b60e4f4c407e34e329ea035aed402bd5710d239c1cadcd8

    • Size

      1.3MB

    • MD5

      73d38f30aca8a28c2fa53318d62c2bfa

    • SHA1

      9122472282a6fd371f2dd03e76bed17e66d830ca

    • SHA256

      c510dbb0f9d0043c4b60e4f4c407e34e329ea035aed402bd5710d239c1cadcd8

    • SHA512

      f3be1caad7cb16fa8516bb270dc077a1f72841414484ab346344b97cbc34a63b632398c5acffe7d9f4c6fba5e686e0f8bd730a1fb21dd1bebe8803f0de065385

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks