General

  • Target

    1fa82d6d052db541b8142f6010bef3fd_JaffaCakes118

  • Size

    773KB

  • Sample

    240702-rxjkxaxakc

  • MD5

    1fa82d6d052db541b8142f6010bef3fd

  • SHA1

    9ccd93de5ae412fd75b1652c6e86f696396eb9a8

  • SHA256

    317808d4ee7666ba9c3ec342698a8bc08fc6681ccc6fe1f6f91acf57222b3b9a

  • SHA512

    2f8ee43be51fd57af996d09bdfc64d6c8fdfd81aeaa2004f91060b03f861a8792106dc1a20f96ae3bdb6fc174eaf5d5825f8385f7660f4286054e59337f17758

  • SSDEEP

    12288:MmLH6OfsQoumCC4WnqLdsNm/CahWxn8rQdjU2zQiWfLFTmEyuPXe6N+x3/Ds3r2y:6QsQbmSMqLY9Lxn8ruKbTmEyQ+x3I2y

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

darkcomet2013.no-ip.biz:1500

192.168.1.71:1500

Mutex

DC_MUTEX-D49T7E9

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    tmtfNVmdwAFv

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

Targets

    • Target

      1fa82d6d052db541b8142f6010bef3fd_JaffaCakes118

    • Size

      773KB

    • MD5

      1fa82d6d052db541b8142f6010bef3fd

    • SHA1

      9ccd93de5ae412fd75b1652c6e86f696396eb9a8

    • SHA256

      317808d4ee7666ba9c3ec342698a8bc08fc6681ccc6fe1f6f91acf57222b3b9a

    • SHA512

      2f8ee43be51fd57af996d09bdfc64d6c8fdfd81aeaa2004f91060b03f861a8792106dc1a20f96ae3bdb6fc174eaf5d5825f8385f7660f4286054e59337f17758

    • SSDEEP

      12288:MmLH6OfsQoumCC4WnqLdsNm/CahWxn8rQdjU2zQiWfLFTmEyuPXe6N+x3/Ds3r2y:6QsQbmSMqLY9Lxn8ruKbTmEyQ+x3I2y

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Winlogon Helper DLL

1
T1547.004

Privilege Escalation

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Winlogon Helper DLL

1
T1547.004

Defense Evasion

Modify Registry

2
T1112

Hide Artifacts

2
T1564

Hidden Files and Directories

2
T1564.001

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks