General

  • Target

    41969234863e6bc9a32d109b4a26e1bd_JaffaCakes118

  • Size

    246KB

  • Sample

    241013-xvrfmatarc

  • MD5

    41969234863e6bc9a32d109b4a26e1bd

  • SHA1

    969154a6c8da5d52a74556622a8143f805958f2b

  • SHA256

    435a9a1aab4037d70d35a984fd74e776067fb16d8c9716a476e2e3c8409cf0c9

  • SHA512

    ad6a1893766f2b98fd187a4384a521ce3b280633f30d539899a936d29ec7e486f05450c4b3dc3bd50ffba1eb8b3f3fe0e9b18548a9fc8d221d18f8f9f80cf14e

  • SSDEEP

    6144:GOU7CxhnDz52L1eBjyve9+HxvV+b+imn+kuEseY:0C3/4u798d0b+imn+kRDY

Malware Config

Extracted

Family

darkcomet

Botnet

juden

C2

PeterMadsen.redirectme.net:9876

Mutex

DC_MUTEX-64V6CFU

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    EpYL1mwZtcQr

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    WinUpdate

Targets

    • Target

      MCCheat.exe

    • Size

      332KB

    • MD5

      2cb001294b65c4199efb88d9fe8b7139

    • SHA1

      0e9a8fbfc8e71ceb3bb00255ddeac61bcda235e0

    • SHA256

      8c6f3f4fde1e51278fded1752129a4feaef5e0973241eb03a5e5093a3ae9011c

    • SHA512

      3abb6f96dd17a1c8352f34ae04ecc8527b06e3b68e88d586fa6a4e786486701d6c5113c0959c0ddca9cf4f1228437b3ba9ec10c8f05f775006333581f71c8351

    • SSDEEP

      6144:BYLtU7Ixhnhz5qLZWBRyve1+HxhV+baign+kuE2:asI3lQK71870baign+kR

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Modifies firewall policy service

    • Modifies security service

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks