General

  • Target

    22090fba4301c1e8d2c354ec2e7f4602_JaffaCakes118

  • Size

    2.9MB

  • Sample

    240703-mkqq8syalb

  • MD5

    22090fba4301c1e8d2c354ec2e7f4602

  • SHA1

    908005d7fc48ac05a024b3515376885759756ac8

  • SHA256

    ad5b0f439826542bd01deed66acca4212f565780901386f7a18744cc7ae723d5

  • SHA512

    4d53d84ad4511555b0455500c4e4b9ac1c4d7be2c54f886395a9d09489ffc60c7a2bc765b3d9e9a5b71a5a977d9de7ea76b28813ef88dc4258a2816680e4593b

  • SSDEEP

    49152:bDbohhDeqhiG9ypyWaMr/IzuXD3qpNAJCPtz2s3B+6gcOnSuDSEQINtOmxdl:bDboTinfaMLIzm7SxBdOnS4SE3NMmnl

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

agmal.no-ip.org:1604

someonei.zapto.org:1604

Mutex

DC_MUTEX-80YRNJ5

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    qJr0xvCfZ7Rf

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

Targets

    • Target

      22090fba4301c1e8d2c354ec2e7f4602_JaffaCakes118

    • Size

      2.9MB

    • MD5

      22090fba4301c1e8d2c354ec2e7f4602

    • SHA1

      908005d7fc48ac05a024b3515376885759756ac8

    • SHA256

      ad5b0f439826542bd01deed66acca4212f565780901386f7a18744cc7ae723d5

    • SHA512

      4d53d84ad4511555b0455500c4e4b9ac1c4d7be2c54f886395a9d09489ffc60c7a2bc765b3d9e9a5b71a5a977d9de7ea76b28813ef88dc4258a2816680e4593b

    • SSDEEP

      49152:bDbohhDeqhiG9ypyWaMr/IzuXD3qpNAJCPtz2s3B+6gcOnSuDSEQINtOmxdl:bDboTinfaMLIzm7SxBdOnS4SE3NMmnl

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Winlogon Helper DLL

1
T1547.004

Privilege Escalation

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Winlogon Helper DLL

1
T1547.004

Defense Evasion

Modify Registry

2
T1112

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Virtualization/Sandbox Evasion

1
T1497

Tasks