General

  • Target

    4564fe3b9e93dfb3ba38c197125dabda_JaffaCakes118

  • Size

    758KB

  • Sample

    241015-c1ptrszdqc

  • MD5

    4564fe3b9e93dfb3ba38c197125dabda

  • SHA1

    e8f3ac2006acc773dd4d66d2cd62bbee7389ac2d

  • SHA256

    fb29ae21d3f271f495910d64c472a441da768020c7899905a56480a0c1c5cf8d

  • SHA512

    3681a3090f5d73268462f27d97697bd9598216d1320616f7184219a6212ae7f071765ef374bfac039bcf69019712024acec96f69ad819804ba5ca0d8cc936af3

  • SSDEEP

    12288:+XhpvNWw276S/DuoeFcfbmiJ99VPhYR5MTSHvLenELrWv1lZw4JuMkMh/fy452Up:gnAw2WWeFcfbP9VPSPMTSPL/rWvzq4J5

Malware Config

Extracted

Family

darkcomet

Botnet

hp

C2

youngmomi.servemp3.com:1604

Mutex

DC_MUTEX-9G7UWDF

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    puTVGGfMmnsa

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

Targets

    • Target

      4564fe3b9e93dfb3ba38c197125dabda_JaffaCakes118

    • Size

      758KB

    • MD5

      4564fe3b9e93dfb3ba38c197125dabda

    • SHA1

      e8f3ac2006acc773dd4d66d2cd62bbee7389ac2d

    • SHA256

      fb29ae21d3f271f495910d64c472a441da768020c7899905a56480a0c1c5cf8d

    • SHA512

      3681a3090f5d73268462f27d97697bd9598216d1320616f7184219a6212ae7f071765ef374bfac039bcf69019712024acec96f69ad819804ba5ca0d8cc936af3

    • SSDEEP

      12288:+XhpvNWw276S/DuoeFcfbmiJ99VPhYR5MTSHvLenELrWv1lZw4JuMkMh/fy452Up:gnAw2WWeFcfbP9VPSPMTSPL/rWvzq4J5

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Modifies security service

    • Windows security bypass

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks