General

  • Target

    JaffaCakes118_ed3ab30862b6c90903e12f5bec47b97abd6b7369481ee4b2814eb2e75d6706e6

  • Size

    1.3MB

  • Sample

    241222-y13arayjer

  • MD5

    20a2ec3c32dee0e3453a7a24338ccdbf

  • SHA1

    ad256893ef3bcb3a83b1ae2b59253daed68f6d5d

  • SHA256

    ed3ab30862b6c90903e12f5bec47b97abd6b7369481ee4b2814eb2e75d6706e6

  • SHA512

    58883b830f82458fda0693d756508011f41daafcc284abac54f25515dc45e7606d7137a46ab8fec642f4b5cc4a495092d8f2d594dd46a8532aa20084ce3577ae

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Malware Config

Targets

    • Target

      JaffaCakes118_ed3ab30862b6c90903e12f5bec47b97abd6b7369481ee4b2814eb2e75d6706e6

    • Size

      1.3MB

    • MD5

      20a2ec3c32dee0e3453a7a24338ccdbf

    • SHA1

      ad256893ef3bcb3a83b1ae2b59253daed68f6d5d

    • SHA256

      ed3ab30862b6c90903e12f5bec47b97abd6b7369481ee4b2814eb2e75d6706e6

    • SHA512

      58883b830f82458fda0693d756508011f41daafcc284abac54f25515dc45e7606d7137a46ab8fec642f4b5cc4a495092d8f2d594dd46a8532aa20084ce3577ae

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks