General

  • Target

    794db9699bff6a6747ac8117087397d9_JaffaCakes118

  • Size

    283KB

  • Sample

    240527-q3xjaaee5x

  • MD5

    794db9699bff6a6747ac8117087397d9

  • SHA1

    82ae9573a54cb47bd978174e224ae055708eca6d

  • SHA256

    f1951cafd5128ed59d7d88bda503f1ef3dc54769c5b1ce5ea710fb66ee585f76

  • SHA512

    fa29e3e593ea2898ec0d65f00aa10d1e22e13c13c3c7e38f238f5a13980ca8a00cda38191970f06c2723c1f96fe3544a5e0de2a840c66848854c0e81b3539531

  • SSDEEP

    6144:8cNYk1yuwEDBum3qYWnl0pd0EX3Zq2b6wfIDYm0P8:8cWkbgTYWnYnt/IDYhP8

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

lololololol228.ddns.net:1604

Mutex

DC_MUTEX-VCBL7KT

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    Qd6UBxTibHFd

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

Targets

    • Target

      794db9699bff6a6747ac8117087397d9_JaffaCakes118

    • Size

      283KB

    • MD5

      794db9699bff6a6747ac8117087397d9

    • SHA1

      82ae9573a54cb47bd978174e224ae055708eca6d

    • SHA256

      f1951cafd5128ed59d7d88bda503f1ef3dc54769c5b1ce5ea710fb66ee585f76

    • SHA512

      fa29e3e593ea2898ec0d65f00aa10d1e22e13c13c3c7e38f238f5a13980ca8a00cda38191970f06c2723c1f96fe3544a5e0de2a840c66848854c0e81b3539531

    • SSDEEP

      6144:8cNYk1yuwEDBum3qYWnl0pd0EX3Zq2b6wfIDYm0P8:8cWkbgTYWnYnt/IDYhP8

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Winlogon Helper DLL

1
T1547.004

Privilege Escalation

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Winlogon Helper DLL

1
T1547.004

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks