General

  • Target

    27d99ea834446c92daf895df3076e487_JaffaCakes118

  • Size

    269KB

  • Sample

    240706-j283cssakm

  • MD5

    27d99ea834446c92daf895df3076e487

  • SHA1

    283b3dcee81b96752046da8383ff910353135811

  • SHA256

    82cef09295e2ff178b18d752489e4e4282e85d8b7e7b84b9bd7e98f345fac546

  • SHA512

    c1c4fb345be66c17f93b91354f5b061a9fe6a52cee50bbe4f7ec3c1e80ec0aa0f06a91d28d4bb13068085225a486a7df656e4977f5bf257e0a833d76ea881464

  • SSDEEP

    6144:HXOCRW3U7+xhnbz5tNKm3od/7cMD8gmoof2:HXOGd+33HDodcsw7f2

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

juba19.no-ip.biz:999

Mutex

DC_MUTEX-CTY29WC

Attributes
  • InstallPath

    WindowsUpdate.exe

  • gencode

    RJJsVKry5zHw

  • install

    true

  • offline_keylogger

    true

  • password

    0123456789

  • persistence

    true

  • reg_key

    MicroUpdate

Targets

    • Target

      27d99ea834446c92daf895df3076e487_JaffaCakes118

    • Size

      269KB

    • MD5

      27d99ea834446c92daf895df3076e487

    • SHA1

      283b3dcee81b96752046da8383ff910353135811

    • SHA256

      82cef09295e2ff178b18d752489e4e4282e85d8b7e7b84b9bd7e98f345fac546

    • SHA512

      c1c4fb345be66c17f93b91354f5b061a9fe6a52cee50bbe4f7ec3c1e80ec0aa0f06a91d28d4bb13068085225a486a7df656e4977f5bf257e0a833d76ea881464

    • SSDEEP

      6144:HXOCRW3U7+xhnbz5tNKm3od/7cMD8gmoof2:HXOGd+33HDodcsw7f2

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Windows security bypass

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Winlogon Helper DLL

1
T1547.004

Privilege Escalation

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Winlogon Helper DLL

1
T1547.004

Defense Evasion

Modify Registry

4
T1112

Impair Defenses

2
T1562

Disable or Modify Tools

2
T1562.001

Hide Artifacts

2
T1564

Hidden Files and Directories

2
T1564.001

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks