General

  • Target

    e04ff8e2f5428eb348ef15d2bff2d773_JaffaCakes118

  • Size

    713KB

  • Sample

    240914-q3485axdnc

  • MD5

    e04ff8e2f5428eb348ef15d2bff2d773

  • SHA1

    dfce6756d38767402779417316d013d57d1737a5

  • SHA256

    a3f83a5dbbb7cf5fa3c6e02941ab958a8d9dfa782a86cfc5bad1e27111878e47

  • SHA512

    76ade40922052104c6decd78a3dcffba55030b23bafe07c205e17fd4fc9b3dd1295c3deaa1b784e363a3df36bb65cd3a52692fb246c33776491cb0b132b5189c

  • SSDEEP

    12288:+47XhpvNWw276S/DuoeFcfbmiJ99VPhYR5MTSHvLenELrWv1lZw4JuMkMh/fy45p:+GnAw2WWeFcfbP9VPSPMTSPL/rWvzq4R

Malware Config

Extracted

Family

darkcomet

Botnet

Stuff

C2

idunnolol123.zapto.org:4023

Mutex

DC_MUTEX-WJ8NW3C

Attributes
  • gencode

    bUmX0FvpA1CS

  • install

    false

  • offline_keylogger

    true

  • password

    lolp1ss

  • persistence

    false

Extracted

Family

latentbot

C2

idunnolol123.zapto.org

Targets

    • Target

      e04ff8e2f5428eb348ef15d2bff2d773_JaffaCakes118

    • Size

      713KB

    • MD5

      e04ff8e2f5428eb348ef15d2bff2d773

    • SHA1

      dfce6756d38767402779417316d013d57d1737a5

    • SHA256

      a3f83a5dbbb7cf5fa3c6e02941ab958a8d9dfa782a86cfc5bad1e27111878e47

    • SHA512

      76ade40922052104c6decd78a3dcffba55030b23bafe07c205e17fd4fc9b3dd1295c3deaa1b784e363a3df36bb65cd3a52692fb246c33776491cb0b132b5189c

    • SSDEEP

      12288:+47XhpvNWw276S/DuoeFcfbmiJ99VPhYR5MTSHvLenELrWv1lZw4JuMkMh/fy45p:+GnAw2WWeFcfbP9VPSPMTSPL/rWvzq4R

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • LatentBot

      Modular trojan written in Delphi which has been in-the-wild since 2013.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks