General

  • Target

    32a226964a6a43441fd83f40763aae4f_JaffaCakes118

  • Size

    747KB

  • Sample

    240511-en5essfa68

  • MD5

    32a226964a6a43441fd83f40763aae4f

  • SHA1

    5f796aab7bd7aef0d0ed3f08a1547731799ec7ce

  • SHA256

    6501e1df2ca602be36aa6b615069264b89135d831a2e46a48796b8d71e4e993b

  • SHA512

    e1ebc51808a02261282926c9c91727a6b5425a049ec28280eaaea7809d4cf4065cd80c133db144c9ca683d90c8be7dde1421232defc86a5a3fda6a3539c687c5

  • SSDEEP

    12288:vk0QVlhmPojAPTMEsUTg0oChO/Q2JbsbjPbN5qhRTtYe3f+Iw86k/R/FFIIhII/:c0QRWoJEfg0oChGdJQbjPbNW5tYeP+GL

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

192.168.2.103:1604

Mutex

DC_MUTEX-C505M8T

Attributes
  • InstallPath

    MSDCSC\win2010.exe

  • gencode

    EdF7vuWm2khN

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    win2010

Targets

    • Target

      32a226964a6a43441fd83f40763aae4f_JaffaCakes118

    • Size

      747KB

    • MD5

      32a226964a6a43441fd83f40763aae4f

    • SHA1

      5f796aab7bd7aef0d0ed3f08a1547731799ec7ce

    • SHA256

      6501e1df2ca602be36aa6b615069264b89135d831a2e46a48796b8d71e4e993b

    • SHA512

      e1ebc51808a02261282926c9c91727a6b5425a049ec28280eaaea7809d4cf4065cd80c133db144c9ca683d90c8be7dde1421232defc86a5a3fda6a3539c687c5

    • SSDEEP

      12288:vk0QVlhmPojAPTMEsUTg0oChO/Q2JbsbjPbN5qhRTtYe3f+Iw86k/R/FFIIhII/:c0QRWoJEfg0oChGdJQbjPbNW5tYeP+GL

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Modifies firewall policy service

    • Modifies security service

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Winlogon Helper DLL

1
T1547.004

Create or Modify System Process

2
T1543

Windows Service

2
T1543.003

Privilege Escalation

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Winlogon Helper DLL

1
T1547.004

Create or Modify System Process

2
T1543

Windows Service

2
T1543.003

Defense Evasion

Modify Registry

7
T1112

Impair Defenses

2
T1562

Disable or Modify Tools

2
T1562.001

Hide Artifacts

2
T1564

Hidden Files and Directories

2
T1564.001

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Remote System Discovery

1
T1018

Tasks