General

  • Target

    495e63ba473422c4753fc8287ac2e5e9_JaffaCakes118

  • Size

    1.0MB

  • Sample

    241015-w6wdaazelh

  • MD5

    495e63ba473422c4753fc8287ac2e5e9

  • SHA1

    d837994bd98e36d2cb2931e981f765ecac3a3325

  • SHA256

    35ccc564a28e1c965db59923298c25509bc5ba1bddc4db6fa58328c154be860c

  • SHA512

    3fb5fbfa29a8c6b8371780c3a03562983e0b16bf96729e0cd52f842a3ca30e0b1789b432e5ba1e351a58f27ed5eabaa31bddc7f122f1d187266260062ea08985

  • SSDEEP

    12288:7kpdlbnphqb54nweIH9M2LgLep2Nn8okQgJZa10IYI1ls1Tl:1TDTM2d3FaqTIw

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16_min

C2

pqj.zapto.org:1500

Mutex

DCMIN_MUTEX-18JAEQL

Attributes
  • InstallPath

    DCSCMIN\Windows Defender.exe

  • gencode

    FWecV5oVYbJE

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    DarkComet RAT

Targets

    • Target

      495e63ba473422c4753fc8287ac2e5e9_JaffaCakes118

    • Size

      1.0MB

    • MD5

      495e63ba473422c4753fc8287ac2e5e9

    • SHA1

      d837994bd98e36d2cb2931e981f765ecac3a3325

    • SHA256

      35ccc564a28e1c965db59923298c25509bc5ba1bddc4db6fa58328c154be860c

    • SHA512

      3fb5fbfa29a8c6b8371780c3a03562983e0b16bf96729e0cd52f842a3ca30e0b1789b432e5ba1e351a58f27ed5eabaa31bddc7f122f1d187266260062ea08985

    • SSDEEP

      12288:7kpdlbnphqb54nweIH9M2LgLep2Nn8okQgJZa10IYI1ls1Tl:1TDTM2d3FaqTIw

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks