General

  • Target

    20c0e7db3abc359de1ea1b468f66e672_JaffaCakes118

  • Size

    290KB

  • Sample

    240507-ra63paad7t

  • MD5

    20c0e7db3abc359de1ea1b468f66e672

  • SHA1

    c718750922cfa8a84b2996634b042e6d174e0bf6

  • SHA256

    720398a159636f239c88e55bb75bf52bd7af634d8559b1f5090dbfa5baec8d81

  • SHA512

    54df9179e8ebc0fe02f68dd62e8b2f45edbec53562f5b04735b6d4919ccec1719a943c4e5e605f884bda29401b0abb5d6e93898fb7943ead365155fc660d76e5

  • SSDEEP

    6144:ocNYk1yuwEDBum3qYWnl0pd0EX3Zq2b6wfIDYm0Pld:ocWkbgTYWnYnt/IDYhPld

Malware Config

Extracted

Family

darkcomet

Attributes
  • gencode

  • install

    false

  • offline_keylogger

    false

  • persistence

    false

Extracted

Family

darkcomet

Botnet

Guest16

C2

amfetominka.myddns.me:56265

amfetominka.myddns.me:52752

103.16.26.83:56265

103.16.26.83:52752

Mutex

DC_MUTEX-G8ZTH20

Attributes
  • gencode

    Sk4vMUC5Mi2q

  • install

    false

  • offline_keylogger

    true

  • persistence

    false

Targets

    • Target

      20c0e7db3abc359de1ea1b468f66e672_JaffaCakes118

    • Size

      290KB

    • MD5

      20c0e7db3abc359de1ea1b468f66e672

    • SHA1

      c718750922cfa8a84b2996634b042e6d174e0bf6

    • SHA256

      720398a159636f239c88e55bb75bf52bd7af634d8559b1f5090dbfa5baec8d81

    • SHA512

      54df9179e8ebc0fe02f68dd62e8b2f45edbec53562f5b04735b6d4919ccec1719a943c4e5e605f884bda29401b0abb5d6e93898fb7943ead365155fc660d76e5

    • SSDEEP

      6144:ocNYk1yuwEDBum3qYWnl0pd0EX3Zq2b6wfIDYm0Pld:ocWkbgTYWnYnt/IDYhPld

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies firewall policy service

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Privilege Escalation

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Defense Evasion

Modify Registry

1
T1112

Hide Artifacts

2
T1564

Hidden Files and Directories

2
T1564.001

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks