General

  • Target

    fcd7b2c234bb370899961b06f1dd2783_JaffaCakes118

  • Size

    696KB

  • Sample

    240928-wjp8raydjn

  • MD5

    fcd7b2c234bb370899961b06f1dd2783

  • SHA1

    04c7d556f6a5cbba897324bbb8de1aa0ae988c5a

  • SHA256

    b5ee0db5d1c48ee5332bfc4c05d7cfafd56a70da866895e7734ad3f9064e6a67

  • SHA512

    523595c1dda22eabebbcd44a261581c114fe736d21b89603e59aaacfb3c9b3c42d83be88171d0a63e356ee522683afcd86a042122bd674336b84158024a5d582

  • SSDEEP

    12288:nNX7HlO0Isvp4lak7gvdyjW46fZo1a60tXMQO8v+eA7XehOgOs:nzOxI4la5VCoow658v+eA76R

Malware Config

Extracted

Family

darkcomet

Botnet

HF

C2

192.168.0.2:100

surfingforus.zapto.org:100

Mutex

DC_MUTEX-B4DJA70

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    ShXk49WH4tyF

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    MicroUpdate

Extracted

Family

latentbot

C2

surfingforus.zapto.org

Targets

    • Target

      fcd7b2c234bb370899961b06f1dd2783_JaffaCakes118

    • Size

      696KB

    • MD5

      fcd7b2c234bb370899961b06f1dd2783

    • SHA1

      04c7d556f6a5cbba897324bbb8de1aa0ae988c5a

    • SHA256

      b5ee0db5d1c48ee5332bfc4c05d7cfafd56a70da866895e7734ad3f9064e6a67

    • SHA512

      523595c1dda22eabebbcd44a261581c114fe736d21b89603e59aaacfb3c9b3c42d83be88171d0a63e356ee522683afcd86a042122bd674336b84158024a5d582

    • SSDEEP

      12288:nNX7HlO0Isvp4lak7gvdyjW46fZo1a60tXMQO8v+eA7XehOgOs:nzOxI4la5VCoow658v+eA76R

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • LatentBot

      Modular trojan written in Delphi which has been in-the-wild since 2013.

    • Modifies WinLogon for persistence

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks