General

  • Target

    4a69734297e7cd98f41f208040c28a43_JaffaCakes118

  • Size

    622KB

  • Sample

    241015-22e4ds1hjc

  • MD5

    4a69734297e7cd98f41f208040c28a43

  • SHA1

    417eb45e734cd520cc5c5c393eeb81071b7bb5f6

  • SHA256

    8120c2d929fb68a042b113126970ec199d9c730d93c04347768041396ed46c4d

  • SHA512

    2ac400dad541f7938c83d8e86596b491c33b23e3b81f45e618aa3dfb3e5c3848b57cab43f61dbd150db05b4f62697bee3d9b53c3787bd218c83ebc228315d3a2

  • SSDEEP

    12288:/3DvGuFQgNAyy+7TZjKi//KCXKkPXiIh4mV4GTObM4ZxssSsjLpFwBXt1+mb:rfFLFWITXiIh4mV4eObM4ZxssSsRFyrL

Malware Config

Extracted

Family

darkcomet

Botnet

Cube

C2

pablito89.no-ip.biz:1604

Mutex

DC_MUTEX-RK3VMAE

Attributes
  • gencode

    ymm6fZFwUpBn

  • install

    false

  • offline_keylogger

    true

  • persistence

    false

Targets

    • Target

      Hack Minecraft/Hack Minecraft.exe

    • Size

      732KB

    • MD5

      5bd3074838470101c492048cc0484c58

    • SHA1

      594d7125c3264bcdcefc9ac011399d0eaf429a68

    • SHA256

      3ed5050d3cd51449eeae1d78058ab7ac198eea6398880ff5c0b68924e082b2b7

    • SHA512

      8c672a7de3ea649f3cbca00f4fe13488377915d35fd6b0437323f51028e92ddebd5a70effc2f0696c978e386b005663c0fe2e2f022493a2fa1f7f4334f28a0b4

    • SSDEEP

      12288:23DZGuFygNAyyS7T9jKi/JKCXKSPXiIlO/TahWxssxHiwy8FwQJjpyu6W:m5FlFM8DXiIkahWxsstFxJjpu

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks