General

  • Target

    JaffaCakes118_f1342761444e6e47af7046bc2db0719a

  • Size

    2.4MB

  • Sample

    250110-3kd1fawjbj

  • MD5

    f1342761444e6e47af7046bc2db0719a

  • SHA1

    d189131f9d477bc4fa4524e1fd2521fb49887811

  • SHA256

    65730273fac03a90f29ce7f8d9b5275604a26b33267d1604cab394150dc7c160

  • SHA512

    97bd8769c85b93f97218af456e45862806b5f75e25647c72f1de01bf65599be9b4d597f875ee0843d9390d2d8d1520dee12cf0baedd572da5a8dfd5d4ac16314

  • SSDEEP

    49152:PbA3uqwj3o71JZAB3jBn8cjcdPH/+yDMu3JgHzCueUTG4:PbMBLZABTF8Ic94u3YveX4

Malware Config

Targets

    • Target

      JaffaCakes118_f1342761444e6e47af7046bc2db0719a

    • Size

      2.4MB

    • MD5

      f1342761444e6e47af7046bc2db0719a

    • SHA1

      d189131f9d477bc4fa4524e1fd2521fb49887811

    • SHA256

      65730273fac03a90f29ce7f8d9b5275604a26b33267d1604cab394150dc7c160

    • SHA512

      97bd8769c85b93f97218af456e45862806b5f75e25647c72f1de01bf65599be9b4d597f875ee0843d9390d2d8d1520dee12cf0baedd572da5a8dfd5d4ac16314

    • SSDEEP

      49152:PbA3uqwj3o71JZAB3jBn8cjcdPH/+yDMu3JgHzCueUTG4:PbMBLZABTF8Ic94u3YveX4

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Disables Task Manager via registry modification

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks