General

  • Target

    24f7cb12617bb15d9281a4f4039fc052_JaffaCakes118

  • Size

    692KB

  • Sample

    240508-qbpz5agd29

  • MD5

    24f7cb12617bb15d9281a4f4039fc052

  • SHA1

    4200a8f021356e664fc60db4815ce2284c2b8b1e

  • SHA256

    73f9c2b4e1fe637eabd8c9fae291e570faea874d5edf060d955372de42d4fd0c

  • SHA512

    fad9ae0246904771f4b07e581f6003d9ca54d1409dd3a3dd028283f13740a9305495822c09dc0a693871253b578dc918b3010d25303cca33eedbd7fecc0412d7

  • SSDEEP

    12288:cXhpvNWw276S/DuoeFcfbmiJ99VPhYR5MTSHvLenELrWv1lZw4JuMkMh/fy452UK:KnAw2WWeFcfbP9VPSPMTSPL/rWvzq4J6

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

12345poebalylovi.ddns.net:1604

12345poebalylovi.ddns.net:27015

Mutex

DC_MUTEX-KVBT238

Attributes
  • gencode

    eWLDJwG3jiE3

  • install

    false

  • offline_keylogger

    true

  • persistence

    false

Targets

    • Target

      24f7cb12617bb15d9281a4f4039fc052_JaffaCakes118

    • Size

      692KB

    • MD5

      24f7cb12617bb15d9281a4f4039fc052

    • SHA1

      4200a8f021356e664fc60db4815ce2284c2b8b1e

    • SHA256

      73f9c2b4e1fe637eabd8c9fae291e570faea874d5edf060d955372de42d4fd0c

    • SHA512

      fad9ae0246904771f4b07e581f6003d9ca54d1409dd3a3dd028283f13740a9305495822c09dc0a693871253b578dc918b3010d25303cca33eedbd7fecc0412d7

    • SSDEEP

      12288:cXhpvNWw276S/DuoeFcfbmiJ99VPhYR5MTSHvLenELrWv1lZw4JuMkMh/fy452UK:KnAw2WWeFcfbP9VPSPMTSPL/rWvzq4J6

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies firewall policy service

    • Modifies security service

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Windows security modification

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Create or Modify System Process

2
T1543

Windows Service

2
T1543.003

Privilege Escalation

Create or Modify System Process

2
T1543

Windows Service

2
T1543.003

Defense Evasion

Modify Registry

5
T1112

Impair Defenses

2
T1562

Disable or Modify Tools

2
T1562.001

Hide Artifacts

2
T1564

Hidden Files and Directories

2
T1564.001

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks