General

  • Target

    JaffaCakes118_22d45452268e2a59199eef54e2ef1923c47249fa33f95242cbbea93be5f9ed27

  • Size

    1.3MB

  • Sample

    241222-xpy9aawnfj

  • MD5

    ad051eb5d5093062b96a49a839a9bc76

  • SHA1

    d75a8fa560ee909d2605d251e5684b16c13f5be1

  • SHA256

    22d45452268e2a59199eef54e2ef1923c47249fa33f95242cbbea93be5f9ed27

  • SHA512

    ef0a536023ffbace48ac9b0e2dbc69be5a8d29cb323d49f757495c1de48c0b5e38763ecb9203359d443cff238268a21aefb45282eef324ae3d7cb5db3b37fd7d

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Malware Config

Targets

    • Target

      JaffaCakes118_22d45452268e2a59199eef54e2ef1923c47249fa33f95242cbbea93be5f9ed27

    • Size

      1.3MB

    • MD5

      ad051eb5d5093062b96a49a839a9bc76

    • SHA1

      d75a8fa560ee909d2605d251e5684b16c13f5be1

    • SHA256

      22d45452268e2a59199eef54e2ef1923c47249fa33f95242cbbea93be5f9ed27

    • SHA512

      ef0a536023ffbace48ac9b0e2dbc69be5a8d29cb323d49f757495c1de48c0b5e38763ecb9203359d443cff238268a21aefb45282eef324ae3d7cb5db3b37fd7d

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks