General

  • Target

    fa1b9a2a660dc1d04ebabdc422562c22_JaffaCakes118

  • Size

    740KB

  • Sample

    240419-mkt4nagf69

  • MD5

    fa1b9a2a660dc1d04ebabdc422562c22

  • SHA1

    4ddfa633a9c1eb62d1a401f299421f3d012fa839

  • SHA256

    9729d469d2ad9b246ebcc280bb4a08724b99224b4fe06df72ef47eb160c7e8f7

  • SHA512

    f3edda1905946b2829c4505b5bcc2c9e20f06b6eb546db97486a66754e33c1cd7a3466838f565fbe24b32a38c69abc239f136c8791c976bbf0996e02538d7eab

  • SSDEEP

    12288:DCSGJkSVSv8md2/4U9A6Ul0WnM4FfC/TA+G8388r5Jz6UlIDf3yIUIPM:DCSGeCXmo/4MA6Ulz5C/sh8388WUlIbE

Malware Config

Extracted

Family

darkcomet

Botnet

8-2-2015

C2

127.0.0.1:9999

evileasy.ddns.net:9999

Mutex

DC_MUTEX-JXEPVLG

Attributes
  • InstallPath

    System32\svchost.exe

  • gencode

    YBPxt5KtujGp

  • install

    true

  • offline_keylogger

    false

  • persistence

    true

  • reg_key

    Svchost

Targets

    • Target

      fa1b9a2a660dc1d04ebabdc422562c22_JaffaCakes118

    • Size

      740KB

    • MD5

      fa1b9a2a660dc1d04ebabdc422562c22

    • SHA1

      4ddfa633a9c1eb62d1a401f299421f3d012fa839

    • SHA256

      9729d469d2ad9b246ebcc280bb4a08724b99224b4fe06df72ef47eb160c7e8f7

    • SHA512

      f3edda1905946b2829c4505b5bcc2c9e20f06b6eb546db97486a66754e33c1cd7a3466838f565fbe24b32a38c69abc239f136c8791c976bbf0996e02538d7eab

    • SSDEEP

      12288:DCSGJkSVSv8md2/4U9A6Ul0WnM4FfC/TA+G8388r5Jz6UlIDf3yIUIPM:DCSGeCXmo/4MA6Ulz5C/sh8388WUlIbE

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Winlogon Helper DLL

1
T1547.004

Privilege Escalation

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Winlogon Helper DLL

1
T1547.004

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks