General

  • Target

    2ba93e7526338456f3c80c94ea1b5d83_JaffaCakes118

  • Size

    2.0MB

  • Sample

    240509-zpx3bseb51

  • MD5

    2ba93e7526338456f3c80c94ea1b5d83

  • SHA1

    02a3ed457dbe62b346a12de60f6d7e2547969230

  • SHA256

    e17185845ed5f9b116b41706d00b7e2139c38007b93040277b81e37a28f88f10

  • SHA512

    04f95a3ef20651067a535607c503bfa26af527094947333ad01800f1484b93377d0b2cbfb1cd6b7da5c1dc3054e46781494ccc4c07957e548b3ca762a042e268

  • SSDEEP

    24576:qsrzWFNGfiM7SvN0rd2dNhLMNy2SX4fsHZGZja63iFangbu8JNvig2RqgvEG5xjJ:qPrNECStq68p8I9tQ4Vta

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

127.0.0.1:1604

Mutex

DC_MUTEX-6V9X0BX

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    5tM0LoWZcrUt

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    MicroUpdate

Targets

    • Target

      2ba93e7526338456f3c80c94ea1b5d83_JaffaCakes118

    • Size

      2.0MB

    • MD5

      2ba93e7526338456f3c80c94ea1b5d83

    • SHA1

      02a3ed457dbe62b346a12de60f6d7e2547969230

    • SHA256

      e17185845ed5f9b116b41706d00b7e2139c38007b93040277b81e37a28f88f10

    • SHA512

      04f95a3ef20651067a535607c503bfa26af527094947333ad01800f1484b93377d0b2cbfb1cd6b7da5c1dc3054e46781494ccc4c07957e548b3ca762a042e268

    • SSDEEP

      24576:qsrzWFNGfiM7SvN0rd2dNhLMNy2SX4fsHZGZja63iFangbu8JNvig2RqgvEG5xjJ:qPrNECStq68p8I9tQ4Vta

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Winlogon Helper DLL

1
T1547.004

Privilege Escalation

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Winlogon Helper DLL

1
T1547.004

Defense Evasion

Modify Registry

3
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Tasks