General

  • Target

    JaffaCakes118_8afb3959eaf496cd8a73a3d91e25e22c

  • Size

    10.1MB

  • Sample

    250108-ezxjbswmfm

  • MD5

    8afb3959eaf496cd8a73a3d91e25e22c

  • SHA1

    44681a9d143cfd48ad3c7fe37e5b4c8f8378b22b

  • SHA256

    75ec6658e2172199d78c87db3de2f85c1f49d229703e12d1725a0913ca4fe213

  • SHA512

    0ec5a1fe87bd1cb5cdd5f686156d88313a57eba46b73f435dc98de5d07bf87d8cf86eb8640b2bdd0314c43bff27bf079708897c0ca5477bbbb2f2cc9405de0d1

  • SSDEEP

    24576:W+O4GptFtiU9SsYm1oO9teGnlcZ/uIO0EdZX0usIW6fgtixy4s+8BIbT19h8OChG:x5o9Y+Iu0u+YoAgO9kK4XyWDAyH6e

Malware Config

Targets

    • Target

      JaffaCakes118_8afb3959eaf496cd8a73a3d91e25e22c

    • Size

      10.1MB

    • MD5

      8afb3959eaf496cd8a73a3d91e25e22c

    • SHA1

      44681a9d143cfd48ad3c7fe37e5b4c8f8378b22b

    • SHA256

      75ec6658e2172199d78c87db3de2f85c1f49d229703e12d1725a0913ca4fe213

    • SHA512

      0ec5a1fe87bd1cb5cdd5f686156d88313a57eba46b73f435dc98de5d07bf87d8cf86eb8640b2bdd0314c43bff27bf079708897c0ca5477bbbb2f2cc9405de0d1

    • SSDEEP

      24576:W+O4GptFtiU9SsYm1oO9teGnlcZ/uIO0EdZX0usIW6fgtixy4s+8BIbT19h8OChG:x5o9Y+Iu0u+YoAgO9kK4XyWDAyH6e

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks