General

  • Target

    JaffaCakes118_056f58dfd4dbd2472994437d57da6515

  • Size

    911KB

  • Sample

    250106-bezamstkdj

  • MD5

    056f58dfd4dbd2472994437d57da6515

  • SHA1

    b25732eeed9b92fa7c41e4d5f624e543841fb889

  • SHA256

    6ab8569493f8b26107d701117956341d4b880ffa0d5e5e498380e9e21fad6ca4

  • SHA512

    1d2f09ad6b752ab5d18797ebbc22991e04a3df27e3dce85f31446690c595b6550cd9db6ec69aaa57b307e36d3f1f247fb37bdfa9fb76496a3fa5e76423e7e1d3

  • SSDEEP

    12288:lcz/RVjOGM6ToNFDsf2CXtq9ackJ74jpDDpXvjLaACqn4:lcTvrMVYNXg9r2MNpXvjuH+4

Malware Config

Targets

    • Target

      JaffaCakes118_056f58dfd4dbd2472994437d57da6515

    • Size

      911KB

    • MD5

      056f58dfd4dbd2472994437d57da6515

    • SHA1

      b25732eeed9b92fa7c41e4d5f624e543841fb889

    • SHA256

      6ab8569493f8b26107d701117956341d4b880ffa0d5e5e498380e9e21fad6ca4

    • SHA512

      1d2f09ad6b752ab5d18797ebbc22991e04a3df27e3dce85f31446690c595b6550cd9db6ec69aaa57b307e36d3f1f247fb37bdfa9fb76496a3fa5e76423e7e1d3

    • SSDEEP

      12288:lcz/RVjOGM6ToNFDsf2CXtq9ackJ74jpDDpXvjLaACqn4:lcTvrMVYNXg9r2MNpXvjuH+4

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks