General

  • Target

    22d5ac3fcc517f8a89f4bfd8c72fcc47_JaffaCakes118

  • Size

    1.3MB

  • Sample

    240703-stgskswamc

  • MD5

    22d5ac3fcc517f8a89f4bfd8c72fcc47

  • SHA1

    97d100535dd1464389c48ff5a6d79de2e4ea8a8b

  • SHA256

    a5049f75eb4e0d0b41f98020da24a5f507f9f2c38a800369212b72f91a64b5c0

  • SHA512

    30d23fa0c63d2029d81e1b9f7ec7c65fc25b5e4d639d5c24f5fb90387ca47933f1e0eed36d3c1e9be3da7cf6030693f6fcc564db533033ba1c5f9d1485ac5527

  • SSDEEP

    12288:k+bDQEPiuB0yBt7a9uGq9hyU0RoGBoQmPoi4NLcGNCtWcnJE6ROqL:1DQE/0yb7a93MaWQNcrjb

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

da3a.no-ip.org:4444

Mutex

DC_MUTEX-F54S21D

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    38yQdY44R512

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

Targets

    • Target

      22d5ac3fcc517f8a89f4bfd8c72fcc47_JaffaCakes118

    • Size

      1.3MB

    • MD5

      22d5ac3fcc517f8a89f4bfd8c72fcc47

    • SHA1

      97d100535dd1464389c48ff5a6d79de2e4ea8a8b

    • SHA256

      a5049f75eb4e0d0b41f98020da24a5f507f9f2c38a800369212b72f91a64b5c0

    • SHA512

      30d23fa0c63d2029d81e1b9f7ec7c65fc25b5e4d639d5c24f5fb90387ca47933f1e0eed36d3c1e9be3da7cf6030693f6fcc564db533033ba1c5f9d1485ac5527

    • SSDEEP

      12288:k+bDQEPiuB0yBt7a9uGq9hyU0RoGBoQmPoi4NLcGNCtWcnJE6ROqL:1DQE/0yb7a93MaWQNcrjb

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Molebox Virtualization software

      Detects file using Molebox Virtualization software.

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Winlogon Helper DLL

1
T1547.004

Privilege Escalation

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Winlogon Helper DLL

1
T1547.004

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks