General

  • Target

    JaffaCakes118_e953a8067a619a9c6e8440f3514163c4dd39ab5d289e7712786083ae08b12c01

  • Size

    1.3MB

  • Sample

    241222-xcwbvsvqcw

  • MD5

    64cf013904c6d1650a646bea5cafb120

  • SHA1

    776de25cb7d86935dbfd51e69aafd12b9c5447bd

  • SHA256

    e953a8067a619a9c6e8440f3514163c4dd39ab5d289e7712786083ae08b12c01

  • SHA512

    6401ce4d7778627bb3bcab3a0a1d2ee25562ca5fa6bc938f490d02784b5cff38053aee4c5a80f236cbd7f62c6445e83da008e494b0571d11eaa13f1374cb9609

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Malware Config

Targets

    • Target

      JaffaCakes118_e953a8067a619a9c6e8440f3514163c4dd39ab5d289e7712786083ae08b12c01

    • Size

      1.3MB

    • MD5

      64cf013904c6d1650a646bea5cafb120

    • SHA1

      776de25cb7d86935dbfd51e69aafd12b9c5447bd

    • SHA256

      e953a8067a619a9c6e8440f3514163c4dd39ab5d289e7712786083ae08b12c01

    • SHA512

      6401ce4d7778627bb3bcab3a0a1d2ee25562ca5fa6bc938f490d02784b5cff38053aee4c5a80f236cbd7f62c6445e83da008e494b0571d11eaa13f1374cb9609

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks