General

  • Target

    fe5abeb99b41caabc40ca3fdc4e32357_JaffaCakes118

  • Size

    1.1MB

  • Sample

    240421-ebzc1sac22

  • MD5

    fe5abeb99b41caabc40ca3fdc4e32357

  • SHA1

    31395d40d0499d83a755e558d16f46a23340b500

  • SHA256

    3de1898cb9ba05922118274f4286962392e3eb63ddb7744ffe3cd3ca9970df1b

  • SHA512

    b2cbdd292881a529fc4eec2423ecdb3603cf52139949557887144816d13617f08919d794af0a4a1aa097d36f48af55956ecc02ced0c175157e20918a6fc5909c

  • SSDEEP

    24576:cjg6rklsxivedtl8wz8iJ2Gqxfrk0mg5jWWPPv/k:ckmklsxw2Dwg2Gg5jXv/k

Malware Config

Extracted

Family

darkcomet

Botnet

Fucked

C2

hidesn.no-ip.org:1604

Mutex

DC_MUTEX-ZEGD8UE

Attributes
  • InstallPath

    System32C/winlogon.exe

  • gencode

    QKzVM5n527Ug

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    winlogon

Targets

    • Target

      fe5abeb99b41caabc40ca3fdc4e32357_JaffaCakes118

    • Size

      1.1MB

    • MD5

      fe5abeb99b41caabc40ca3fdc4e32357

    • SHA1

      31395d40d0499d83a755e558d16f46a23340b500

    • SHA256

      3de1898cb9ba05922118274f4286962392e3eb63ddb7744ffe3cd3ca9970df1b

    • SHA512

      b2cbdd292881a529fc4eec2423ecdb3603cf52139949557887144816d13617f08919d794af0a4a1aa097d36f48af55956ecc02ced0c175157e20918a6fc5909c

    • SSDEEP

      24576:cjg6rklsxivedtl8wz8iJ2Gqxfrk0mg5jWWPPv/k:ckmklsxw2Dwg2Gg5jXv/k

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Modifies firewall policy service

    • Modifies security service

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks