General

  • Target

    27edad5f65699a4902be0c87d9689b7a_JaffaCakes118

  • Size

    1.4MB

  • Sample

    241009-a3t56avdlj

  • MD5

    27edad5f65699a4902be0c87d9689b7a

  • SHA1

    555ae912f29ed80c8eb5982870b4402399958e17

  • SHA256

    17034b1b9625e8e930663cabfa157c7d97832af640ffaa930314f771c9717800

  • SHA512

    99ad5b5d076f545cfbd19da4a13b50f3be1c88dbffbdbddb19fd3bad6114c22d4ae4762d5c6dc37c016cf53a92000196df8ac969e51f331c0afa0daaf8965cf1

  • SSDEEP

    24576:qVfyKxj79glUacpyK/2jHFF3D9glUacpyK/2jHFF3:By9k1jlFz9k1jlF

Malware Config

Extracted

Family

darkcomet

Botnet

trojan

C2

glauco69.no-ip.org:1604

Mutex

DC_MUTEX-STJ5WZY

Attributes
  • InstallPath

    APP#\servizi.exe

  • gencode

    u1U8EM1x7LCM

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    MicroUpdate

Extracted

Family

darkcomet

Botnet

camfrog

C2

zerbino85.no-ip.org:1604

Mutex

DC_MUTEX-0E72WNG

Attributes
  • InstallPath

    APP#\explorer.exe

  • gencode

    dRT83mxwn6wq

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    processo di sistema

Targets

    • Target

      27edad5f65699a4902be0c87d9689b7a_JaffaCakes118

    • Size

      1.4MB

    • MD5

      27edad5f65699a4902be0c87d9689b7a

    • SHA1

      555ae912f29ed80c8eb5982870b4402399958e17

    • SHA256

      17034b1b9625e8e930663cabfa157c7d97832af640ffaa930314f771c9717800

    • SHA512

      99ad5b5d076f545cfbd19da4a13b50f3be1c88dbffbdbddb19fd3bad6114c22d4ae4762d5c6dc37c016cf53a92000196df8ac969e51f331c0afa0daaf8965cf1

    • SSDEEP

      24576:qVfyKxj79glUacpyK/2jHFF3D9glUacpyK/2jHFF3:By9k1jlFz9k1jlF

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Modifies firewall policy service

    • Modifies security service

    • Windows security bypass

    • Drops file in Drivers directory

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks