General

  • Target

    a624aa1f6f7f6eb9d04020e3e6638e84_JaffaCakes118

  • Size

    881KB

  • Sample

    240818-ks8kxawarg

  • MD5

    a624aa1f6f7f6eb9d04020e3e6638e84

  • SHA1

    a7f7463fb19e0d04c7c1d63ca2b338c3a7667dfc

  • SHA256

    1374c9b8a6efcd3545952347bf2d76ee31a5170c4f5bdc914766d19bc8286cb5

  • SHA512

    3e9d36a113652efd09d9a2279083da6faafc551828a15f2595bcdbe04326d6f75cacfcc137f3b1f728540fed988f91a71770aa2577bbcf2fa25dcc1177d935ea

  • SSDEEP

    24576:QhGcW2ywZ1kqWgfXNTn+oRKPYuciiCWL:QXW2ywigzruciFa

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

botnetclients.zapto.org:1604

127.0.0.1:1604

Mutex

DC_MUTEX-3AXC87R

Attributes
  • gencode

    9wPMRqlWAgCe

  • install

    false

  • offline_keylogger

    true

  • persistence

    false

Extracted

Family

latentbot

C2

botnetclients.zapto.org

Targets

    • Target

      a624aa1f6f7f6eb9d04020e3e6638e84_JaffaCakes118

    • Size

      881KB

    • MD5

      a624aa1f6f7f6eb9d04020e3e6638e84

    • SHA1

      a7f7463fb19e0d04c7c1d63ca2b338c3a7667dfc

    • SHA256

      1374c9b8a6efcd3545952347bf2d76ee31a5170c4f5bdc914766d19bc8286cb5

    • SHA512

      3e9d36a113652efd09d9a2279083da6faafc551828a15f2595bcdbe04326d6f75cacfcc137f3b1f728540fed988f91a71770aa2577bbcf2fa25dcc1177d935ea

    • SSDEEP

      24576:QhGcW2ywZ1kqWgfXNTn+oRKPYuciiCWL:QXW2ywigzruciFa

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • LatentBot

      Modular trojan written in Delphi which has been in-the-wild since 2013.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks