General

  • Target

    4de1c5485e4e5193eea571dbc6d0606d_JaffaCakes118

  • Size

    898KB

  • Sample

    241016-t4shhateml

  • MD5

    4de1c5485e4e5193eea571dbc6d0606d

  • SHA1

    81b4123710e7f6a012b6680be179671586c85f66

  • SHA256

    d3a4ebd2f8291633618bbec77f27b8c9bd7fef27e60a47c206f3d8c41aeded6c

  • SHA512

    d292b84daeefbb1166e61f718760aa1d44f7ec195f7948633e87e369cf236ec4d67c314611941903205ff077ca9de1894c7805d181a27bedc857616d4e68bc03

  • SSDEEP

    24576:3dQoweo+5d5lW4T0LReq86st68g6if0uGbS21tA23:3dQGo8h41iDghWSi

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

95.79.31.101:1604

Mutex

DC_MUTEX-E2ZGDTS

Attributes
  • InstallPath

    MSDCSC\svchost.exe

  • gencode

    rW8pc78Q0Uk7

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

Targets

    • Target

      4de1c5485e4e5193eea571dbc6d0606d_JaffaCakes118

    • Size

      898KB

    • MD5

      4de1c5485e4e5193eea571dbc6d0606d

    • SHA1

      81b4123710e7f6a012b6680be179671586c85f66

    • SHA256

      d3a4ebd2f8291633618bbec77f27b8c9bd7fef27e60a47c206f3d8c41aeded6c

    • SHA512

      d292b84daeefbb1166e61f718760aa1d44f7ec195f7948633e87e369cf236ec4d67c314611941903205ff077ca9de1894c7805d181a27bedc857616d4e68bc03

    • SSDEEP

      24576:3dQoweo+5d5lW4T0LReq86st68g6if0uGbS21tA23:3dQGo8h41iDghWSi

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks