General

  • Target

    016e20f53d9abcd81969b219a9403d0c_JaffaCakes118

  • Size

    824KB

  • Sample

    240620-as55nsyfkb

  • MD5

    016e20f53d9abcd81969b219a9403d0c

  • SHA1

    a1c6004a6336b312b61622519f0305d5e6be9b5c

  • SHA256

    dbd5175524d0c28a7ac148c2c1ef04cc273c9892334064b0e60389b0477d65c8

  • SHA512

    b9d537d8582dd3c4ba555950660b5e2cce4827d66fc3c8c4e0758a75171ac614db3766e00ff2eb875a9857982b3e341e33f892850a5a1229576388330ce873f0

  • SSDEEP

    24576:dZg15Rf2/3UW/u29vYYRCPIYXlMXA+XEx4:dkRf2X2c4BV/z4

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

127.0.0.1:81

khaledboos.no-ip.biz:81

Mutex

DC_MUTEX-8R7JJ6F

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    7oM227tF3Edh

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

Targets

    • Target

      016e20f53d9abcd81969b219a9403d0c_JaffaCakes118

    • Size

      824KB

    • MD5

      016e20f53d9abcd81969b219a9403d0c

    • SHA1

      a1c6004a6336b312b61622519f0305d5e6be9b5c

    • SHA256

      dbd5175524d0c28a7ac148c2c1ef04cc273c9892334064b0e60389b0477d65c8

    • SHA512

      b9d537d8582dd3c4ba555950660b5e2cce4827d66fc3c8c4e0758a75171ac614db3766e00ff2eb875a9857982b3e341e33f892850a5a1229576388330ce873f0

    • SSDEEP

      24576:dZg15Rf2/3UW/u29vYYRCPIYXlMXA+XEx4:dkRf2X2c4BV/z4

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Winlogon Helper DLL

1
T1547.004

Privilege Escalation

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Winlogon Helper DLL

1
T1547.004

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks