General

  • Target

    0032923c4273ee9cae8a704f7a25fe82_JaffaCakes118

  • Size

    1.3MB

  • Sample

    240619-ygnm9ayejc

  • MD5

    0032923c4273ee9cae8a704f7a25fe82

  • SHA1

    36409476a9d1e92121e227f71c407dce1ef586ee

  • SHA256

    f173b00071e8aa63d2b7e3493203aa2b9245c3e5b43cc8626c86f655b39c6487

  • SHA512

    4556e6bf618fe0cabec255a52635b468bdaf01391e5ddb131470ab44b72eb6924fd4e5f1d398e182d372c5ba82fea39d73bad378b37e41ca436b20ace36ba08b

  • SSDEEP

    12288:LNlBcdK2yMq3Sb4/h0E+BJ64kDwsTpW74YCuaoG7mu/gos9rnX9Ntc2wDfrE0Dt0:L1oImQCBMAJbYU2Qs38z

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

slient.no-ip.biz:1604

42.117.239.159:1604

Mutex

DC_MUTEX-CRNC0F1

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    1bWmuNAg36hA

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    MicroUpdate

Targets

    • Target

      0032923c4273ee9cae8a704f7a25fe82_JaffaCakes118

    • Size

      1.3MB

    • MD5

      0032923c4273ee9cae8a704f7a25fe82

    • SHA1

      36409476a9d1e92121e227f71c407dce1ef586ee

    • SHA256

      f173b00071e8aa63d2b7e3493203aa2b9245c3e5b43cc8626c86f655b39c6487

    • SHA512

      4556e6bf618fe0cabec255a52635b468bdaf01391e5ddb131470ab44b72eb6924fd4e5f1d398e182d372c5ba82fea39d73bad378b37e41ca436b20ace36ba08b

    • SSDEEP

      12288:LNlBcdK2yMq3Sb4/h0E+BJ64kDwsTpW74YCuaoG7mu/gos9rnX9Ntc2wDfrE0Dt0:L1oImQCBMAJbYU2Qs38z

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Uses the VBS compiler for execution

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scripting

1
T1064

Persistence

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Winlogon Helper DLL

1
T1547.004

Privilege Escalation

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Winlogon Helper DLL

1
T1547.004

Defense Evasion

Modify Registry

2
T1112

Scripting

1
T1064

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks