General

  • Target

    JaffaCakes118_8879248d8f2d6f75e03a0de553498742bb8657fb6391494680ed7951a5cbd1a9

  • Size

    1.3MB

  • Sample

    241222-z27saszlan

  • MD5

    01d885405aa61f9ab7bd63f7c7695bb9

  • SHA1

    bfe061e7d8fac11b3aa8164a1789cbadb3b67cd8

  • SHA256

    8879248d8f2d6f75e03a0de553498742bb8657fb6391494680ed7951a5cbd1a9

  • SHA512

    387313a67863a8cbc7de82184ab212e858572a53727c0c375e3ba2f4cc580d72525efdb4b383c398ca679b3ad4fdf187af566de6e0687f93fafd96eb90e66e2a

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Malware Config

Targets

    • Target

      JaffaCakes118_8879248d8f2d6f75e03a0de553498742bb8657fb6391494680ed7951a5cbd1a9

    • Size

      1.3MB

    • MD5

      01d885405aa61f9ab7bd63f7c7695bb9

    • SHA1

      bfe061e7d8fac11b3aa8164a1789cbadb3b67cd8

    • SHA256

      8879248d8f2d6f75e03a0de553498742bb8657fb6391494680ed7951a5cbd1a9

    • SHA512

      387313a67863a8cbc7de82184ab212e858572a53727c0c375e3ba2f4cc580d72525efdb4b383c398ca679b3ad4fdf187af566de6e0687f93fafd96eb90e66e2a

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks