General

  • Target

    JaffaCakes118_45040416d519b7447a2a2ade5bd930e1

  • Size

    1.2MB

  • Sample

    250107-bj1n9syphk

  • MD5

    45040416d519b7447a2a2ade5bd930e1

  • SHA1

    acd8113a92ac889e8155353ad7b273fd277652d0

  • SHA256

    f7a57529f19db7d7441e106f36a9c50930df5008669847a7d2625f184c76b26c

  • SHA512

    e9d2323bb20daaf073cb5536942b8db7e2a8b63705ec4913ffe18cf935372a6e72f7a1946c0b1ecc8b973077c4972ba15dd3b3b52f05c3f3d3f93118312f35f9

  • SSDEEP

    24576:u2G/nvxW3WieCeBHFKDfzK4x2jlGhn/KefXD7H44Z+43:ubA3jeHFKzO+swX/E6

Malware Config

Targets

    • Target

      JaffaCakes118_45040416d519b7447a2a2ade5bd930e1

    • Size

      1.2MB

    • MD5

      45040416d519b7447a2a2ade5bd930e1

    • SHA1

      acd8113a92ac889e8155353ad7b273fd277652d0

    • SHA256

      f7a57529f19db7d7441e106f36a9c50930df5008669847a7d2625f184c76b26c

    • SHA512

      e9d2323bb20daaf073cb5536942b8db7e2a8b63705ec4913ffe18cf935372a6e72f7a1946c0b1ecc8b973077c4972ba15dd3b3b52f05c3f3d3f93118312f35f9

    • SSDEEP

      24576:u2G/nvxW3WieCeBHFKDfzK4x2jlGhn/KefXD7H44Z+43:ubA3jeHFKzO+swX/E6

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks