General

  • Target

    JaffaCakes118_e185ece2d9fff8f8e11b23e595307f5409b359e4d91438d240afed6af17da651

  • Size

    1.3MB

  • Sample

    241222-wwzmysvrbj

  • MD5

    d40139b905cf0ec11a2b5e4969e16d5f

  • SHA1

    1a887bbc407efe7cccbe07598a3a67f20dbe29ff

  • SHA256

    e185ece2d9fff8f8e11b23e595307f5409b359e4d91438d240afed6af17da651

  • SHA512

    ee798c7b6b86a8b51a420036daff14818fb855b50e47a2e1f5ac89ae835355c4ff8f2976e09c07665af2bdb87bec7614173a5d1a600269300cc0de8d5e851999

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Malware Config

Targets

    • Target

      JaffaCakes118_e185ece2d9fff8f8e11b23e595307f5409b359e4d91438d240afed6af17da651

    • Size

      1.3MB

    • MD5

      d40139b905cf0ec11a2b5e4969e16d5f

    • SHA1

      1a887bbc407efe7cccbe07598a3a67f20dbe29ff

    • SHA256

      e185ece2d9fff8f8e11b23e595307f5409b359e4d91438d240afed6af17da651

    • SHA512

      ee798c7b6b86a8b51a420036daff14818fb855b50e47a2e1f5ac89ae835355c4ff8f2976e09c07665af2bdb87bec7614173a5d1a600269300cc0de8d5e851999

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks