General

  • Target

    JaffaCakes118_dd5d99624481537c7a861118199327e1

  • Size

    2.4MB

  • Sample

    250110-hb9qjavqd1

  • MD5

    dd5d99624481537c7a861118199327e1

  • SHA1

    b05527ae0d68e4f49b6c3928b861c5b32651b8ef

  • SHA256

    a8b290c2a6e1f47e8d40dd37226ca96c05b442125dd920fe59c70ee4355e1f1a

  • SHA512

    f4ffa4e158820654cf4a1f5d53c575eb3e91954ac07389baa139e3a4cd8f3960a54af8f69f041b76bb301aa993e96159f4eafbfe57eba730476ceff14737eb7f

  • SSDEEP

    49152:UbA30qHwLrdtkbaCwcp4RXL7D764zB2qH+:UbtZiaYeL7DxB3+

Malware Config

Targets

    • Target

      JaffaCakes118_dd5d99624481537c7a861118199327e1

    • Size

      2.4MB

    • MD5

      dd5d99624481537c7a861118199327e1

    • SHA1

      b05527ae0d68e4f49b6c3928b861c5b32651b8ef

    • SHA256

      a8b290c2a6e1f47e8d40dd37226ca96c05b442125dd920fe59c70ee4355e1f1a

    • SHA512

      f4ffa4e158820654cf4a1f5d53c575eb3e91954ac07389baa139e3a4cd8f3960a54af8f69f041b76bb301aa993e96159f4eafbfe57eba730476ceff14737eb7f

    • SSDEEP

      49152:UbA30qHwLrdtkbaCwcp4RXL7D764zB2qH+:UbtZiaYeL7DxB3+

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks