General

  • Target

    JaffaCakes118_5cf52073c857663094cb9adfed619466

  • Size

    912KB

  • Sample

    250107-l8dk5sylar

  • MD5

    5cf52073c857663094cb9adfed619466

  • SHA1

    39b9659ed36da558aea03f4143203590dcc22e5b

  • SHA256

    2d6700a4c98e079bd9d66aca7c0b3a00f16d255168d357331125ed815309251b

  • SHA512

    aec119cac2d5d5dec51f219dd6a306e63bcbdc4b824c51e0f79c8282d2e12f9ee9fcad4b9232d4aca2ac48ba292a967a725f1ae8a610ad794e99910f53e41bda

  • SSDEEP

    12288:3MDfrNRZBJfl9RE7phmUtEsS4QP9WleSAYqQWPqyYW3nKqn4:3MTbZzZeKUNHA986Q4XK+4

Malware Config

Targets

    • Target

      JaffaCakes118_5cf52073c857663094cb9adfed619466

    • Size

      912KB

    • MD5

      5cf52073c857663094cb9adfed619466

    • SHA1

      39b9659ed36da558aea03f4143203590dcc22e5b

    • SHA256

      2d6700a4c98e079bd9d66aca7c0b3a00f16d255168d357331125ed815309251b

    • SHA512

      aec119cac2d5d5dec51f219dd6a306e63bcbdc4b824c51e0f79c8282d2e12f9ee9fcad4b9232d4aca2ac48ba292a967a725f1ae8a610ad794e99910f53e41bda

    • SSDEEP

      12288:3MDfrNRZBJfl9RE7phmUtEsS4QP9WleSAYqQWPqyYW3nKqn4:3MTbZzZeKUNHA986Q4XK+4

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks