General

  • Target

    6905a6ca3f102b6ef15e201f78c1832f_JaffaCakes118

  • Size

    1013KB

  • Sample

    240723-1es63asgng

  • MD5

    6905a6ca3f102b6ef15e201f78c1832f

  • SHA1

    82381130e1ff8bca669458a9dd6fc1a239dc20e4

  • SHA256

    be6107f8f8c8cbea54ea42a1f07bfddcb96869b0ac9daf2402c823ef07720b5f

  • SHA512

    95e68679ae0a7ea48c9eb05a95cabd570a3d3bcb57ca840436419496e340c0788f09163b7ead48f68f32c0af2fa5e79a2398a63df8b527ae83f567b3665e986c

  • SSDEEP

    12288:T1Eu4AZ+EOJTSNT8JpclOVgvcWS2LgHtJpXMKI1jdT5yRVhJUzIwX5+9NB8GYbnh:/0GMG15eisLl74ZYS+/VRZ

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16_min

C2

127.0.0.1:1604

Mutex

DCMIN_MUTEX-HKW1NR3

Attributes
  • InstallPath

    DCSCMIN\IMDCSC.exe

  • gencode

    TwujvCFEKqKu

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    imdcsc

Targets

    • Target

      6905a6ca3f102b6ef15e201f78c1832f_JaffaCakes118

    • Size

      1013KB

    • MD5

      6905a6ca3f102b6ef15e201f78c1832f

    • SHA1

      82381130e1ff8bca669458a9dd6fc1a239dc20e4

    • SHA256

      be6107f8f8c8cbea54ea42a1f07bfddcb96869b0ac9daf2402c823ef07720b5f

    • SHA512

      95e68679ae0a7ea48c9eb05a95cabd570a3d3bcb57ca840436419496e340c0788f09163b7ead48f68f32c0af2fa5e79a2398a63df8b527ae83f567b3665e986c

    • SSDEEP

      12288:T1Eu4AZ+EOJTSNT8JpclOVgvcWS2LgHtJpXMKI1jdT5yRVhJUzIwX5+9NB8GYbnh:/0GMG15eisLl74ZYS+/VRZ

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Winlogon Helper DLL

1
T1547.004

Privilege Escalation

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Winlogon Helper DLL

1
T1547.004

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

System Location Discovery

1
T1614

System Language Discovery

1
T1614.001

Tasks