General

  • Target

    JaffaCakes118_ac674c36c60c7231c8021e873b92137d16d0260a1b92e899849fa98421d275ed

  • Size

    1.3MB

  • Sample

    241222-pp6pcsymcj

  • MD5

    cd91a2e3175abbc3c2c1dfdd5495c28b

  • SHA1

    3bab62947c58143761b717d4f6777ccb44f1cf09

  • SHA256

    ac674c36c60c7231c8021e873b92137d16d0260a1b92e899849fa98421d275ed

  • SHA512

    32329330db3e3db2888d88777822e164f0dff36a6039c6b74f46c2eefc9e2ce12b0bb0ceba12ca4ff1a53bdfbc3eac88e242ded8a1bf806db764d86a7a1abf7c

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Malware Config

Targets

    • Target

      JaffaCakes118_ac674c36c60c7231c8021e873b92137d16d0260a1b92e899849fa98421d275ed

    • Size

      1.3MB

    • MD5

      cd91a2e3175abbc3c2c1dfdd5495c28b

    • SHA1

      3bab62947c58143761b717d4f6777ccb44f1cf09

    • SHA256

      ac674c36c60c7231c8021e873b92137d16d0260a1b92e899849fa98421d275ed

    • SHA512

      32329330db3e3db2888d88777822e164f0dff36a6039c6b74f46c2eefc9e2ce12b0bb0ceba12ca4ff1a53bdfbc3eac88e242ded8a1bf806db764d86a7a1abf7c

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks