General

  • Target

    f6aeffca0e1cf8e83b427d4f9504d78d_JaffaCakes118

  • Size

    758KB

  • Sample

    240417-145w6aha4t

  • MD5

    f6aeffca0e1cf8e83b427d4f9504d78d

  • SHA1

    260c5fde43873a2a5908d6cbfe8e56756c8c1565

  • SHA256

    0134132faa0cd4ed6702b1799d68bd600f88c30224cdd3eb3131559bc3568f21

  • SHA512

    e94db51a2db03c032e1a3f33059341d4577cb9199828f58bf04ea04d5d9ea1a4eb2f001dd9e6d2279730d772671ebfd2f8f0ba0a9df881e1c498fff27db827e4

  • SSDEEP

    12288:CXhpvNWw276S/DuoeFcfbmiJ99VPhYR5MTSHvLenELrWv1lZw4JuMkwh/kb:snAw2WWeFcfbP9VPSPMTSPL/rWvzq4Ji

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

securityandsafe.no-ip.biz:81

Mutex

DC_MUTEX-3GA9ZCL

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    r2c553wUEgYQ

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

Targets

    • Target

      f6aeffca0e1cf8e83b427d4f9504d78d_JaffaCakes118

    • Size

      758KB

    • MD5

      f6aeffca0e1cf8e83b427d4f9504d78d

    • SHA1

      260c5fde43873a2a5908d6cbfe8e56756c8c1565

    • SHA256

      0134132faa0cd4ed6702b1799d68bd600f88c30224cdd3eb3131559bc3568f21

    • SHA512

      e94db51a2db03c032e1a3f33059341d4577cb9199828f58bf04ea04d5d9ea1a4eb2f001dd9e6d2279730d772671ebfd2f8f0ba0a9df881e1c498fff27db827e4

    • SSDEEP

      12288:CXhpvNWw276S/DuoeFcfbmiJ99VPhYR5MTSHvLenELrWv1lZw4JuMkwh/kb:snAw2WWeFcfbP9VPSPMTSPL/rWvzq4Ji

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Modifies security service

    • Windows security bypass

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Winlogon Helper DLL

1
T1547.004

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Privilege Escalation

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Winlogon Helper DLL

1
T1547.004

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Defense Evasion

Modify Registry

5
T1112

Impair Defenses

2
T1562

Disable or Modify Tools

2
T1562.001

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks