General

  • Target

    283d3f40cb4f12259ef8bd2c5ebbf406_JaffaCakes118

  • Size

    650KB

  • Sample

    240706-mmkb8syfja

  • MD5

    283d3f40cb4f12259ef8bd2c5ebbf406

  • SHA1

    33751f18e0a953919f9198176d3ec1724993bb9a

  • SHA256

    be08f8dcf02955c53f5a58d0fdab532927afeef012c8d390fea140696fd7c981

  • SHA512

    0cabb22d274841fecf9de49f8b7e81a144d568136a9c796bfa6a4719964b571aac4c8bda1a59929932f349da3dcf46ad6e5eb44bec35b5cd85d7015983077e49

  • SSDEEP

    12288:Lk0QVlhmPojAPTMEsUTg0oChO/Q2JbsbjPbN5qhRTtYe3f+Iw86k/9/+O:g0QRWoJEfg0oChGdJQbjPbNW5tYeP+GP

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

127.0.0.1:1610

192.168.0.3:1610

2.122.231.141:1610

Mutex

DC_MUTEX-SL5BMKE

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    6b5kLSZ37ocv

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

Targets

    • Target

      283d3f40cb4f12259ef8bd2c5ebbf406_JaffaCakes118

    • Size

      650KB

    • MD5

      283d3f40cb4f12259ef8bd2c5ebbf406

    • SHA1

      33751f18e0a953919f9198176d3ec1724993bb9a

    • SHA256

      be08f8dcf02955c53f5a58d0fdab532927afeef012c8d390fea140696fd7c981

    • SHA512

      0cabb22d274841fecf9de49f8b7e81a144d568136a9c796bfa6a4719964b571aac4c8bda1a59929932f349da3dcf46ad6e5eb44bec35b5cd85d7015983077e49

    • SSDEEP

      12288:Lk0QVlhmPojAPTMEsUTg0oChO/Q2JbsbjPbN5qhRTtYe3f+Iw86k/9/+O:g0QRWoJEfg0oChGdJQbjPbNW5tYeP+GP

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Winlogon Helper DLL

1
T1547.004

Privilege Escalation

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Winlogon Helper DLL

1
T1547.004

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks