General

  • Target

    JaffaCakes118_17a7d15f2bf4b3bfbfd51a5ccc6902593c21282498975e4195b5a5bc7b692233

  • Size

    1.3MB

  • Sample

    241223-p6qdpsznct

  • MD5

    472a5a1a55eb7f454f71fc6cb874ec8a

  • SHA1

    1bcdeb82673bd1fcf0b1104071299d7f37af5c8f

  • SHA256

    17a7d15f2bf4b3bfbfd51a5ccc6902593c21282498975e4195b5a5bc7b692233

  • SHA512

    5b3e181e482a4f385e1d115092a8a6b600c6b913cbc3b50c2f57f5e929cc3a31425e7a1ae2293a4a652afc8118edf7fedf68e4d6600cc5a0701ee9e9d2977e13

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Malware Config

Targets

    • Target

      JaffaCakes118_17a7d15f2bf4b3bfbfd51a5ccc6902593c21282498975e4195b5a5bc7b692233

    • Size

      1.3MB

    • MD5

      472a5a1a55eb7f454f71fc6cb874ec8a

    • SHA1

      1bcdeb82673bd1fcf0b1104071299d7f37af5c8f

    • SHA256

      17a7d15f2bf4b3bfbfd51a5ccc6902593c21282498975e4195b5a5bc7b692233

    • SHA512

      5b3e181e482a4f385e1d115092a8a6b600c6b913cbc3b50c2f57f5e929cc3a31425e7a1ae2293a4a652afc8118edf7fedf68e4d6600cc5a0701ee9e9d2977e13

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks