General

  • Target

    0df8be0c5b8b92dabf95a247f4d2cd23_JaffaCakes118

  • Size

    747KB

  • Sample

    240625-n3e8ws1enn

  • MD5

    0df8be0c5b8b92dabf95a247f4d2cd23

  • SHA1

    81de912273ef4d1e099c8b05700818accbefb384

  • SHA256

    b36726b5b0a9c2086ec856cbd3c35d25a4265b13df209dff19f73df94484a060

  • SHA512

    608ffcb02f983fa8149bcdac1c6dc8979f5bf2f4bb80ee08b06e7a9a8dc3c5e04b06cb1461321159166d738e782b111e41ed32d6b602918faeec040056eb1144

  • SSDEEP

    12288:9k0QVlhmPojAPTMEsUTg0oChO/Q2JbsbjPbN5qhRTtYe3f+Iw86k/9/+rsvvL:O0QRWoJEfg0oChGdJQbjPbNW5tYeP+GR

Malware Config

Extracted

Family

darkcomet

Botnet

Test

C2

pastillfanboi.no-ip.org:3784

Mutex

DC_MUTEX-7TCYJAH

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    4a76z2FXA3Qj

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    Steam

Targets

    • Target

      0df8be0c5b8b92dabf95a247f4d2cd23_JaffaCakes118

    • Size

      747KB

    • MD5

      0df8be0c5b8b92dabf95a247f4d2cd23

    • SHA1

      81de912273ef4d1e099c8b05700818accbefb384

    • SHA256

      b36726b5b0a9c2086ec856cbd3c35d25a4265b13df209dff19f73df94484a060

    • SHA512

      608ffcb02f983fa8149bcdac1c6dc8979f5bf2f4bb80ee08b06e7a9a8dc3c5e04b06cb1461321159166d738e782b111e41ed32d6b602918faeec040056eb1144

    • SSDEEP

      12288:9k0QVlhmPojAPTMEsUTg0oChO/Q2JbsbjPbN5qhRTtYe3f+Iw86k/9/+rsvvL:O0QRWoJEfg0oChGdJQbjPbNW5tYeP+GR

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Winlogon Helper DLL

1
T1547.004

Privilege Escalation

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Winlogon Helper DLL

1
T1547.004

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks