General

  • Target

    JaffaCakes118_89a8b7765c165c59acd848f57da879077286dd77ec92317345f6746196b21b6e

  • Size

    1.3MB

  • Sample

    241222-qbkqeaypht

  • MD5

    bcb137bb110878a1567a5a649a8e6f8f

  • SHA1

    8f902e7206cbeef4433a3bbbf29a78e2d35ec39f

  • SHA256

    89a8b7765c165c59acd848f57da879077286dd77ec92317345f6746196b21b6e

  • SHA512

    860b9d5bc0a8084ff9e11afc00d6904a14bf9fe2dc62bb1e6a145f4a3053cf07f188b544a59e35907f1dbd6a2257eea4359e44e1f38e7367dc002c2c2fd6d068

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Malware Config

Targets

    • Target

      JaffaCakes118_89a8b7765c165c59acd848f57da879077286dd77ec92317345f6746196b21b6e

    • Size

      1.3MB

    • MD5

      bcb137bb110878a1567a5a649a8e6f8f

    • SHA1

      8f902e7206cbeef4433a3bbbf29a78e2d35ec39f

    • SHA256

      89a8b7765c165c59acd848f57da879077286dd77ec92317345f6746196b21b6e

    • SHA512

      860b9d5bc0a8084ff9e11afc00d6904a14bf9fe2dc62bb1e6a145f4a3053cf07f188b544a59e35907f1dbd6a2257eea4359e44e1f38e7367dc002c2c2fd6d068

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks