General

  • Target

    56ea9e0cbe53a987a917994bcbfd1339_JaffaCakes118

  • Size

    939KB

  • Sample

    240718-l8dwxatenr

  • MD5

    56ea9e0cbe53a987a917994bcbfd1339

  • SHA1

    d3e2aed0f4d7dcbb467e15b4bbdd1a0ad5c9ebfb

  • SHA256

    b4f2a6fa8f11d91439ab034bde80fc52bb29e761899c135b671cc07410b4f4c9

  • SHA512

    282fdac699fb58dc547f91f080292610c5bfb6a96ff9f519f00f7b6090fa966a4766449691ae2c33eb8fe8a88b913f8491dad2762750097e1bba1ebd6476db01

  • SSDEEP

    24576:7vNNf2Dwn4UdvZrMwpCLRM7nJFOMJ+edXNdUO/dsq:7vzf2kPzL7lUis

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16_min

C2

skan-sparta.no-ip.org:1604

Mutex

DCMIN_MUTEX-2WPL857

Attributes
  • InstallPath

    DCSCMIN\IMDCSC.exe

  • gencode

    hAngpybPPA3s

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    DarkComet RAT

Targets

    • Target

      56ea9e0cbe53a987a917994bcbfd1339_JaffaCakes118

    • Size

      939KB

    • MD5

      56ea9e0cbe53a987a917994bcbfd1339

    • SHA1

      d3e2aed0f4d7dcbb467e15b4bbdd1a0ad5c9ebfb

    • SHA256

      b4f2a6fa8f11d91439ab034bde80fc52bb29e761899c135b671cc07410b4f4c9

    • SHA512

      282fdac699fb58dc547f91f080292610c5bfb6a96ff9f519f00f7b6090fa966a4766449691ae2c33eb8fe8a88b913f8491dad2762750097e1bba1ebd6476db01

    • SSDEEP

      24576:7vNNf2Dwn4UdvZrMwpCLRM7nJFOMJ+edXNdUO/dsq:7vzf2kPzL7lUis

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Adds Run key to start application

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Winlogon Helper DLL

1
T1547.004

Privilege Escalation

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Winlogon Helper DLL

1
T1547.004

Defense Evasion

Modify Registry

2
T1112

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

1
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

1
T1082

Tasks