General

  • Target

    JaffaCakes118_70efb1bfc943310507e345e5d4c4659a

  • Size

    2.9MB

  • Sample

    250107-wgf73atlfm

  • MD5

    70efb1bfc943310507e345e5d4c4659a

  • SHA1

    4d770f651e9e206983d2223ddb8ce7489b59dce2

  • SHA256

    143a4aac0008786b5dc5c9f1fd94536c535e3a24f064526bba8f5b49bcdb2810

  • SHA512

    e337ae217f42f304ff25cca3ec9272e375e3e66043def82c3cfa74c05e2b3415f3ac7244808fe263c452df0a7664abd024a33169a0bc4394d3ae5ee38e212b45

  • SSDEEP

    49152:98wHWg2dOM7U8eEdHWls4K/c9TScxGuaGolGDISsA/0dwOZ/Szo+zCV:98wv2dOEBBWq1EVd53DI46FZ/Mov

Malware Config

Targets

    • Target

      JaffaCakes118_70efb1bfc943310507e345e5d4c4659a

    • Size

      2.9MB

    • MD5

      70efb1bfc943310507e345e5d4c4659a

    • SHA1

      4d770f651e9e206983d2223ddb8ce7489b59dce2

    • SHA256

      143a4aac0008786b5dc5c9f1fd94536c535e3a24f064526bba8f5b49bcdb2810

    • SHA512

      e337ae217f42f304ff25cca3ec9272e375e3e66043def82c3cfa74c05e2b3415f3ac7244808fe263c452df0a7664abd024a33169a0bc4394d3ae5ee38e212b45

    • SSDEEP

      49152:98wHWg2dOM7U8eEdHWls4K/c9TScxGuaGolGDISsA/0dwOZ/Szo+zCV:98wv2dOEBBWq1EVd53DI46FZ/Mov

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks