General

  • Target

    6ffc00b2a7c5bc4c77a4b06914d0d8a9_JaffaCakes118

  • Size

    690KB

  • Sample

    240524-2a56hadd82

  • MD5

    6ffc00b2a7c5bc4c77a4b06914d0d8a9

  • SHA1

    e9f18465739dcbb2c9895fdb2ebf2bef56f32eb6

  • SHA256

    8986bfb1900c20f50afc224f1a26c3607f709b162fe5465b4edca813405f24af

  • SHA512

    0ac70ccccddb4bf68d33a0f38947729a3c9c9a06e3ac529b71246075cc2aa4602b820d553f27e3e4fb3098b9f5a61ee24e153d9640023178455bba0fee207723

  • SSDEEP

    12288:K9HMeUmcufrvA3kb445UEJ2jsWiD4EvFuu4cNgZhCiZK3/XL:GiBIGkbxqEcjsWiDxguehC2+

Malware Config

Extracted

Family

darkcomet

Botnet

Bro

C2

95.31.137.27:27015

Mutex

DC_MUTEX-ZQ511FH

Attributes
  • InstallPath

    MSDCSC\systems.exe

  • gencode

    g2UFlCb0BEwa

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

Targets

    • Target

      6ffc00b2a7c5bc4c77a4b06914d0d8a9_JaffaCakes118

    • Size

      690KB

    • MD5

      6ffc00b2a7c5bc4c77a4b06914d0d8a9

    • SHA1

      e9f18465739dcbb2c9895fdb2ebf2bef56f32eb6

    • SHA256

      8986bfb1900c20f50afc224f1a26c3607f709b162fe5465b4edca813405f24af

    • SHA512

      0ac70ccccddb4bf68d33a0f38947729a3c9c9a06e3ac529b71246075cc2aa4602b820d553f27e3e4fb3098b9f5a61ee24e153d9640023178455bba0fee207723

    • SSDEEP

      12288:K9HMeUmcufrvA3kb445UEJ2jsWiD4EvFuu4cNgZhCiZK3/XL:GiBIGkbxqEcjsWiDxguehC2+

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Modifies firewall policy service

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Winlogon Helper DLL

1
T1547.004

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Privilege Escalation

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Winlogon Helper DLL

1
T1547.004

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Defense Evasion

Modify Registry

3
T1112

Hide Artifacts

2
T1564

Hidden Files and Directories

2
T1564.001

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks