General

  • Target

    JaffaCakes118_3381479bab1dcacfbb8a7e4a4537f5f9

  • Size

    1.2MB

  • Sample

    250106-w3ew5awjgp

  • MD5

    3381479bab1dcacfbb8a7e4a4537f5f9

  • SHA1

    771087a449813a1ab214aec8447122d28d772bfd

  • SHA256

    e0b451a5258bdacc66d22f0e7b45b67cb35a5bb7acab07aac122bd472e5a0827

  • SHA512

    a062dc024ba2effa2373790775f103cc8a14662ce444280b631656c816832f4e173f4e943c1efa0e8f39a0e66c77a2ccfe47df25970944bba47610f02932af73

  • SSDEEP

    24576:s2G/nvxW3WvpSbNLEJxpseQihFqfmVPOBBD+4L:sbA3WM9MxBTZ3m

Malware Config

Targets

    • Target

      JaffaCakes118_3381479bab1dcacfbb8a7e4a4537f5f9

    • Size

      1.2MB

    • MD5

      3381479bab1dcacfbb8a7e4a4537f5f9

    • SHA1

      771087a449813a1ab214aec8447122d28d772bfd

    • SHA256

      e0b451a5258bdacc66d22f0e7b45b67cb35a5bb7acab07aac122bd472e5a0827

    • SHA512

      a062dc024ba2effa2373790775f103cc8a14662ce444280b631656c816832f4e173f4e943c1efa0e8f39a0e66c77a2ccfe47df25970944bba47610f02932af73

    • SSDEEP

      24576:s2G/nvxW3WvpSbNLEJxpseQihFqfmVPOBBD+4L:sbA3WM9MxBTZ3m

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks