General

  • Target

    1ad222817e233d62bf4f13ba5cd265bb_JaffaCakes118

  • Size

    629KB

  • Sample

    241007-b92n9aseld

  • MD5

    1ad222817e233d62bf4f13ba5cd265bb

  • SHA1

    fe33a75ed6dbe560ba6ed18a43defc56e85ba69b

  • SHA256

    7952a11768d2762889c98648d15dbcbf90c8f5f6ddd11439ae0e5c3433cb3b0f

  • SHA512

    bda0ccbf75b6af9673b15395e4a60aeacd8c8fb4cdef83b6e71fb410d8af842122608021093be7c9bed7333e4fee7abf353050881c000a44245f1cea3872f30f

  • SSDEEP

    12288:g5Zv5vYeDKMhjpPsqMAYerDPVpARHohnBuyWXNk6e+FQab:gndYwPlPs3nGJQIhnLik6eQb

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.gmail.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    ligotti19

Extracted

Family

darkcomet

Botnet

DarkComet

C2

imsocoolbeans.no-ip.biz:1200

Mutex

DC_MUTEX-BQA5EB5

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    P8PVu3Y0o1qm

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

Targets

    • Target

      MW3 Aimbot 1.17.exe

    • Size

      734KB

    • MD5

      6f661717f822d043cce6b34cafc904e8

    • SHA1

      225bfbe18919298748a505cf0ebf80229f228f45

    • SHA256

      86bfd8592ba81d9134fc04ca1c0a9dc2df8a9cb757ca0fc57d955be0ff151900

    • SHA512

      cb6a83f59b769c3ab4f3bc8d620f561d9271924623a08d3bfc9bde9a646a9ac91de735e98f14e24f32a1b60f08843f2e0ee7bf4912d2c76ff58cf75f14e860a5

    • SSDEEP

      12288:csT1ncdi3W6kBcMvSy4lKmtwH9PIB6sfuUoUIkINKEEdbNhIHhQ7deG44KVNW2JW:bT1nsDay+ujuudU9IUZdpKBwAGIXkL8M

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks