General

  • Target

    JaffaCakes118_f45ea312f758d397ca56081095a26f746c30d12ea7ce1a2ade8c6b9a818b3a5a

  • Size

    1.3MB

  • Sample

    241230-cqzwzsvkaw

  • MD5

    fae8ca0cccd6610616b2a77255b8c6a2

  • SHA1

    3782da47a80bd8e3663e845f51640787623adadf

  • SHA256

    f45ea312f758d397ca56081095a26f746c30d12ea7ce1a2ade8c6b9a818b3a5a

  • SHA512

    addd9198fc7dfdb69aa867b3cb474775d4e0eded55d398ab52dfad669433fd3d1f685da8923683ecd6eda9e7d1f85db2e44b22c905578c7298780b3efe41ac89

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Malware Config

Targets

    • Target

      JaffaCakes118_f45ea312f758d397ca56081095a26f746c30d12ea7ce1a2ade8c6b9a818b3a5a

    • Size

      1.3MB

    • MD5

      fae8ca0cccd6610616b2a77255b8c6a2

    • SHA1

      3782da47a80bd8e3663e845f51640787623adadf

    • SHA256

      f45ea312f758d397ca56081095a26f746c30d12ea7ce1a2ade8c6b9a818b3a5a

    • SHA512

      addd9198fc7dfdb69aa867b3cb474775d4e0eded55d398ab52dfad669433fd3d1f685da8923683ecd6eda9e7d1f85db2e44b22c905578c7298780b3efe41ac89

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks