General

  • Target

    4a47e04852564dcd9f5881fbd69c6bd9_JaffaCakes118

  • Size

    414KB

  • Sample

    240715-sygclsxdnr

  • MD5

    4a47e04852564dcd9f5881fbd69c6bd9

  • SHA1

    a6684ad9f665f0ebf6c243de8b8e309ce195d1fc

  • SHA256

    19d059c2008cdd0d30babc96de89c13c2dc38922cfc6f735af4902953469a0c4

  • SHA512

    82ee1980f8893c0bf6798c71864a4ee4f298cb5de875b81503fcd738c25150baa579c6e144f507ab6e48ff61af70d6a43bbb54d91752d74d182f1ad75bb43281

  • SSDEEP

    12288:MDxoIVCNZwI1eQu/tEzSha7GwAdTusAUa:6o1IIQNNQDWYUa

Malware Config

Extracted

Family

darkcomet

Botnet

Victim

C2

karmaisabitch.zapto.org:1604

Mutex

DC_MUTEX-XBX7X34

Attributes
  • gencode

    bSi6W85Uhvq8

  • install

    false

  • offline_keylogger

    true

  • password

    vwurJnIHQY8Xd4X

  • persistence

    false

Extracted

Family

latentbot

C2

karmaisabitch.zapto.org

Targets

    • Target

      4a47e04852564dcd9f5881fbd69c6bd9_JaffaCakes118

    • Size

      414KB

    • MD5

      4a47e04852564dcd9f5881fbd69c6bd9

    • SHA1

      a6684ad9f665f0ebf6c243de8b8e309ce195d1fc

    • SHA256

      19d059c2008cdd0d30babc96de89c13c2dc38922cfc6f735af4902953469a0c4

    • SHA512

      82ee1980f8893c0bf6798c71864a4ee4f298cb5de875b81503fcd738c25150baa579c6e144f507ab6e48ff61af70d6a43bbb54d91752d74d182f1ad75bb43281

    • SSDEEP

      12288:MDxoIVCNZwI1eQu/tEzSha7GwAdTusAUa:6o1IIQNNQDWYUa

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • LatentBot

      Modular trojan written in Delphi which has been in-the-wild since 2013.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks