General

  • Target

    e45a79fdfd9c1823eadd96bdc52cbf30_JaffaCakes118

  • Size

    649KB

  • Sample

    240407-hzcqpsff4y

  • MD5

    e45a79fdfd9c1823eadd96bdc52cbf30

  • SHA1

    5124ab3e7a273485a4e64622957add0c07047f19

  • SHA256

    d43131875d36af3deaecb0fdd75ef3f9c94510d0685cabfe6e56ce72e139b795

  • SHA512

    efc5301117aac1339deff299835e070d049ced5d8a7de07adb2ab353fe2f4adc6f9a5c88ba8d7a51bd3826a5e3ca9e616c59b2eb5db1af51d12e349fef1728ec

  • SSDEEP

    12288:bk0QVlhmPojAPTMEsUTg0oChO/Q2JbsbjPbN5qhRTtYe3f+Iw86k/9/+N:Q0QRWoJEfg0oChGdJQbjPbNW5tYeP+G8

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16_min

C2

127.0.0.1:1604

Mutex

DCMIN_MUTEX-P595NWL

Attributes
  • InstallPath

    DCSCMIN\IMDCSC.exe

  • gencode

    afbYVHbl6NwM

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    DarkComet RAT

Targets

    • Target

      e45a79fdfd9c1823eadd96bdc52cbf30_JaffaCakes118

    • Size

      649KB

    • MD5

      e45a79fdfd9c1823eadd96bdc52cbf30

    • SHA1

      5124ab3e7a273485a4e64622957add0c07047f19

    • SHA256

      d43131875d36af3deaecb0fdd75ef3f9c94510d0685cabfe6e56ce72e139b795

    • SHA512

      efc5301117aac1339deff299835e070d049ced5d8a7de07adb2ab353fe2f4adc6f9a5c88ba8d7a51bd3826a5e3ca9e616c59b2eb5db1af51d12e349fef1728ec

    • SSDEEP

      12288:bk0QVlhmPojAPTMEsUTg0oChO/Q2JbsbjPbN5qhRTtYe3f+Iw86k/9/+N:Q0QRWoJEfg0oChGdJQbjPbNW5tYeP+G8

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Winlogon Helper DLL

1
T1547.004

Privilege Escalation

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Winlogon Helper DLL

1
T1547.004

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks