General

  • Target

    3cd22e39728858e6eef3d6014e3be4fa_JaffaCakes118

  • Size

    3.5MB

  • Sample

    240712-le3yyaxeln

  • MD5

    3cd22e39728858e6eef3d6014e3be4fa

  • SHA1

    9e31ed3c0999fbff1cd845d0672bdd8da06161f3

  • SHA256

    3e48f31c58fe1774e0af8b4bd60e31b152d4b83f6879926e368f298d02b30d05

  • SHA512

    897d0a66f8a239f2126b31fa10b6dd43b9ee017f79466005b9523bda0b90d7a7db957c8c82285866f9add0336e4056b1382147f6013801ef7a474c558898206d

  • SSDEEP

    98304:B0OKrE0idlfADAa1zeUL9ajDpobn4BjnHwc+DzM+yjb3Je:B0OKojg8g/wjD6nVQ++bJe

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16_min

C2

127.0.0.1:1604

Mutex

DCMIN_MUTEX-YV1ZQNQ

Attributes
  • InstallPath

    DCSCMIN\IMDCSC.exe

  • gencode

    u4FE130b0VyD

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    DarkComet RAT

Targets

    • Target

      3cd22e39728858e6eef3d6014e3be4fa_JaffaCakes118

    • Size

      3.5MB

    • MD5

      3cd22e39728858e6eef3d6014e3be4fa

    • SHA1

      9e31ed3c0999fbff1cd845d0672bdd8da06161f3

    • SHA256

      3e48f31c58fe1774e0af8b4bd60e31b152d4b83f6879926e368f298d02b30d05

    • SHA512

      897d0a66f8a239f2126b31fa10b6dd43b9ee017f79466005b9523bda0b90d7a7db957c8c82285866f9add0336e4056b1382147f6013801ef7a474c558898206d

    • SSDEEP

      98304:B0OKrE0idlfADAa1zeUL9ajDpobn4BjnHwc+DzM+yjb3Je:B0OKojg8g/wjD6nVQ++bJe

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Winlogon Helper DLL

1
T1547.004

Privilege Escalation

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Winlogon Helper DLL

1
T1547.004

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks