General

  • Target

    aa3f376ee6d85e33aa791291895177c9_JaffaCakes118

  • Size

    742KB

  • Sample

    240819-j4vyhsshqa

  • MD5

    aa3f376ee6d85e33aa791291895177c9

  • SHA1

    ff86f021ea787521055a4d0d807860c9747dfef3

  • SHA256

    79ad7b5c345b6afa3bc8eda6a651dcb3f09baec5aa0878b438fc57d7f5927902

  • SHA512

    a79e33ce2a7f50d728a39da040bd6e6f32010ecca7e563ffda7160ab079410aa3630e260f62826aa0112de4a442488acc19a182fd2f5afdfbec3f8ee7a65ae93

  • SSDEEP

    12288:bXhpvNWw276S/DuoeFcfbmiJ99VPhYR5MTSHvLenELrWv1lZw4JuMkMh/fy452Uq:DnAw2WWeFcfbP9VPSPMTSPL/rWvzq4J6

Malware Config

Extracted

Family

darkcomet

Botnet

Victim

C2

82s0am1had4.zapto.org:100

Mutex

DC_MUTEX-G4LZUTN

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    F3lYXdRPPoW4

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    Avgnt2

Extracted

Family

latentbot

C2

82s0am1had4.zapto.org

Targets

    • Target

      aa3f376ee6d85e33aa791291895177c9_JaffaCakes118

    • Size

      742KB

    • MD5

      aa3f376ee6d85e33aa791291895177c9

    • SHA1

      ff86f021ea787521055a4d0d807860c9747dfef3

    • SHA256

      79ad7b5c345b6afa3bc8eda6a651dcb3f09baec5aa0878b438fc57d7f5927902

    • SHA512

      a79e33ce2a7f50d728a39da040bd6e6f32010ecca7e563ffda7160ab079410aa3630e260f62826aa0112de4a442488acc19a182fd2f5afdfbec3f8ee7a65ae93

    • SSDEEP

      12288:bXhpvNWw276S/DuoeFcfbmiJ99VPhYR5MTSHvLenELrWv1lZw4JuMkMh/fy452Uq:DnAw2WWeFcfbP9VPSPMTSPL/rWvzq4J6

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • LatentBot

      Modular trojan written in Delphi which has been in-the-wild since 2013.

    • Modifies WinLogon for persistence

    • Modifies firewall policy service

    • Modifies security service

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks