General

  • Target

    260b520a8348e3112ceefda08be64621_JaffaCakes118

  • Size

    1.1MB

  • Sample

    240704-yhyjvawajk

  • MD5

    260b520a8348e3112ceefda08be64621

  • SHA1

    99f49036a122b9744be8bd7e1e6eb0a1c572ac61

  • SHA256

    5c4bbe2fd9d909bba1148b8d8d64f4e8771d4d8baaee7dcbedc2697028b8fdd2

  • SHA512

    f64ce1b036cf30af0d5f10388208c64e951a49678a759c515df36cb90856cc5c3de4cc34dd4f4dadff669a075127aecdd9a4d2a6e9c29913c656586b5d0da7bd

  • SSDEEP

    12288:3aO2T++88hpyG+6pJWjOLO2+XGW06MpDDs97s/7eeImdlSy1DVXUG+PdEq6TRXqm:KOmtpPJVLGupDg7szynCXpttw7

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

own-saoo.no-ip.info:1604

Mutex

DC_MUTEX-8E7RPM7

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    3UoWP9PkNgap

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

Targets

    • Target

      260b520a8348e3112ceefda08be64621_JaffaCakes118

    • Size

      1.1MB

    • MD5

      260b520a8348e3112ceefda08be64621

    • SHA1

      99f49036a122b9744be8bd7e1e6eb0a1c572ac61

    • SHA256

      5c4bbe2fd9d909bba1148b8d8d64f4e8771d4d8baaee7dcbedc2697028b8fdd2

    • SHA512

      f64ce1b036cf30af0d5f10388208c64e951a49678a759c515df36cb90856cc5c3de4cc34dd4f4dadff669a075127aecdd9a4d2a6e9c29913c656586b5d0da7bd

    • SSDEEP

      12288:3aO2T++88hpyG+6pJWjOLO2+XGW06MpDDs97s/7eeImdlSy1DVXUG+PdEq6TRXqm:KOmtpPJVLGupDg7szynCXpttw7

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scripting

1
T1064

Persistence

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Winlogon Helper DLL

1
T1547.004

Privilege Escalation

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Winlogon Helper DLL

1
T1547.004

Defense Evasion

Modify Registry

2
T1112

Hide Artifacts

2
T1564

Hidden Files and Directories

2
T1564.001

Scripting

1
T1064

Tasks