General

  • Target

    1816dd0f974fecd01a3aee390593de19_JaffaCakes118

  • Size

    1.3MB

  • Sample

    240628-al6gvsshqp

  • MD5

    1816dd0f974fecd01a3aee390593de19

  • SHA1

    67c477675af6dfd5fca81669a58daae9fa8ddc8c

  • SHA256

    4b259a4d6a566836a4e511b7ca5d0bd5775360fd52eaf89b03035d4e602431c5

  • SHA512

    2488732d171cbd43f283cf423d493b1294439a5a4e200b6454a24267eb8f2a815058ef4798c16198b9b6bd4dbbb5442adaf103f483b02935b098bd9fa5fe966a

  • SSDEEP

    24576:KdWfwUBOzQKW8d4UR/tqhnyMIo0eyauZUKctbFPZX46fJ6dVUqhkNvaWJ6Uq:q0p6pR/mndIoxyPU/btmVUqyRTq

Malware Config

Extracted

Family

darkcomet

Botnet

metin2-gio

C2

127.0.0.1:1604

hepter.dyndns.biz:8211

hepter.no-ip.org:8211

127.0.0.1:8211

Mutex

DC_MUTEX-C50UDX6

Attributes
  • InstallPath

    Resimlerim\Profiles\chrome.exe

  • gencode

    ja8PAQUAvm4V

  • install

    true

  • offline_keylogger

    true

  • password

    hepter

  • persistence

    true

  • reg_key

    GoogleUpdate

Targets

    • Target

      1816dd0f974fecd01a3aee390593de19_JaffaCakes118

    • Size

      1.3MB

    • MD5

      1816dd0f974fecd01a3aee390593de19

    • SHA1

      67c477675af6dfd5fca81669a58daae9fa8ddc8c

    • SHA256

      4b259a4d6a566836a4e511b7ca5d0bd5775360fd52eaf89b03035d4e602431c5

    • SHA512

      2488732d171cbd43f283cf423d493b1294439a5a4e200b6454a24267eb8f2a815058ef4798c16198b9b6bd4dbbb5442adaf103f483b02935b098bd9fa5fe966a

    • SSDEEP

      24576:KdWfwUBOzQKW8d4UR/tqhnyMIo0eyauZUKctbFPZX46fJ6dVUqhkNvaWJ6Uq:q0p6pR/mndIoxyPU/btmVUqyRTq

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Modifies firewall policy service

    • Modifies security service

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.