General

  • Target

    cb6bde01b9bd96be9e7a3b39601d696d_JaffaCakes118

  • Size

    1.1MB

  • Sample

    240830-w71pdsydmf

  • MD5

    cb6bde01b9bd96be9e7a3b39601d696d

  • SHA1

    e873f810351e9fa2e27e89191f1aba02eb14d5de

  • SHA256

    dfd0da819764547d4ec0c70f17b0461416bed3db0be3df399588635db2bf4da0

  • SHA512

    6990b21a3bf984b1e78e1a50ba166d0443cf434364afba981c1783c39ee4560a676433da276bf035ed6d677c93dafb041eada90e9cc518bfe3b36d04ec446ba1

  • SSDEEP

    24576:uKiQgRxWQvVW2f09pNXZGtCjaWN9x7qUlAVbx:uKdgjWQvcTX0tCWWNr7qUlAd

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

runescapeddos.zapto.org:1604

Mutex

DC_MUTEX-FLVLT7H

Attributes
  • gencode

    WesYzs0NizmP

  • install

    false

  • offline_keylogger

    true

  • persistence

    false

Extracted

Family

latentbot

C2

runescapeddos.zapto.org

Targets

    • Target

      cb6bde01b9bd96be9e7a3b39601d696d_JaffaCakes118

    • Size

      1.1MB

    • MD5

      cb6bde01b9bd96be9e7a3b39601d696d

    • SHA1

      e873f810351e9fa2e27e89191f1aba02eb14d5de

    • SHA256

      dfd0da819764547d4ec0c70f17b0461416bed3db0be3df399588635db2bf4da0

    • SHA512

      6990b21a3bf984b1e78e1a50ba166d0443cf434364afba981c1783c39ee4560a676433da276bf035ed6d677c93dafb041eada90e9cc518bfe3b36d04ec446ba1

    • SSDEEP

      24576:uKiQgRxWQvVW2f09pNXZGtCjaWN9x7qUlAVbx:uKdgjWQvcTX0tCWWNr7qUlAd

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • LatentBot

      Modular trojan written in Delphi which has been in-the-wild since 2013.

    • Modifies firewall policy service

    • Modifies security service

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Windows security modification

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks