General

  • Target

    669a8820f42031e50a160933f8562201_JaffaCakes118

  • Size

    1.2MB

  • Sample

    240723-hyll8atcpb

  • MD5

    669a8820f42031e50a160933f8562201

  • SHA1

    83aaccd7330ed876b0ff2362c3a9b5744759ce2d

  • SHA256

    0985f6dee6b78ecad2d409776ef1fa5a1910355d0c2fd75507361ef42f0e15e0

  • SHA512

    a108dfd367613d7f5e453227a7ac9293214e61e8545bb6565ec4a2bfc4038018f7cd8de3b470cf67e315a8f523df15adbd23b547667b6d77de8e9378b835f8d3

  • SSDEEP

    24576:dweJp94oubd7seByJ3y0n2BZieWEIefGf11rWHT1MYpVknRNZI9AK:dzj4oAvMCIX9A5

Malware Config

Targets

    • Target

      669a8820f42031e50a160933f8562201_JaffaCakes118

    • Size

      1.2MB

    • MD5

      669a8820f42031e50a160933f8562201

    • SHA1

      83aaccd7330ed876b0ff2362c3a9b5744759ce2d

    • SHA256

      0985f6dee6b78ecad2d409776ef1fa5a1910355d0c2fd75507361ef42f0e15e0

    • SHA512

      a108dfd367613d7f5e453227a7ac9293214e61e8545bb6565ec4a2bfc4038018f7cd8de3b470cf67e315a8f523df15adbd23b547667b6d77de8e9378b835f8d3

    • SSDEEP

      24576:dweJp94oubd7seByJ3y0n2BZieWEIefGf11rWHT1MYpVknRNZI9AK:dzj4oAvMCIX9A5

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • UAC bypass

    • Windows security bypass

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Uses the VBS compiler for execution

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks