General

  • Target

    475ed004da785a249ba1a537a5a91f46_JaffaCakes118

  • Size

    1.4MB

  • Sample

    241015-mv5cdatgql

  • MD5

    475ed004da785a249ba1a537a5a91f46

  • SHA1

    1845ce0b33790401c02ae2bc4c921e4b67d62d92

  • SHA256

    7b57f2c1e6199c2973acf6527a75a5f2c233e5f3c309a07737c230706eb411e0

  • SHA512

    8a72b97ee212113ec9866880ca06f69b68cb490da87b460efc6606095058508a0e6bae6c9c46692c84b8dde9366cca7470602fb7cea78dfcf0ae4be7d349cd8e

  • SSDEEP

    24576:Q/ZBumSO9V6T6gfa4+hqUM4/JibT5cbC:Q/rpgA/BJio

Malware Config

Targets

    • Target

      475ed004da785a249ba1a537a5a91f46_JaffaCakes118

    • Size

      1.4MB

    • MD5

      475ed004da785a249ba1a537a5a91f46

    • SHA1

      1845ce0b33790401c02ae2bc4c921e4b67d62d92

    • SHA256

      7b57f2c1e6199c2973acf6527a75a5f2c233e5f3c309a07737c230706eb411e0

    • SHA512

      8a72b97ee212113ec9866880ca06f69b68cb490da87b460efc6606095058508a0e6bae6c9c46692c84b8dde9366cca7470602fb7cea78dfcf0ae4be7d349cd8e

    • SSDEEP

      24576:Q/ZBumSO9V6T6gfa4+hqUM4/JibT5cbC:Q/rpgA/BJio

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Windows security bypass

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Uses the VBS compiler for execution

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks