General

  • Target

    512e15f39afaf4bd204454deb4f2bea0_JaffaCakes118

  • Size

    1.3MB

  • Sample

    241017-h9vn9s1ckj

  • MD5

    512e15f39afaf4bd204454deb4f2bea0

  • SHA1

    861246e9af0ecdc148ee87f1103d6ebdef5ce991

  • SHA256

    ce0a51650f34b2fe144bb4e75e3c02ce17620747286261cfc63d203afda26d21

  • SHA512

    75a09c73f4531ec80fb51b24e0592d231f52257a25f1e243403cebf1ca0e01af38e4545e8f4b9612c5fce0e82045d85380360e3ed4f25693165a9cfdc8d63e39

  • SSDEEP

    12288:2MeRfvBd3gpuNWd0nGTpcTJAmfCppjLTQ14CtYMyhEeWcb2/iM5xZGQ8WwYSYryJ:2hpCzNkeEpFwLzISPTr+p9D0QZh9u

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

127.0.0.1:1604

192.168.1.66:1604

scottreadingfc.zapto.org:1604

Mutex

DC_MUTEX-KDK4V5U

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    yPpxaq4gnzED

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

Targets

    • Target

      512e15f39afaf4bd204454deb4f2bea0_JaffaCakes118

    • Size

      1.3MB

    • MD5

      512e15f39afaf4bd204454deb4f2bea0

    • SHA1

      861246e9af0ecdc148ee87f1103d6ebdef5ce991

    • SHA256

      ce0a51650f34b2fe144bb4e75e3c02ce17620747286261cfc63d203afda26d21

    • SHA512

      75a09c73f4531ec80fb51b24e0592d231f52257a25f1e243403cebf1ca0e01af38e4545e8f4b9612c5fce0e82045d85380360e3ed4f25693165a9cfdc8d63e39

    • SSDEEP

      12288:2MeRfvBd3gpuNWd0nGTpcTJAmfCppjLTQ14CtYMyhEeWcb2/iM5xZGQ8WwYSYryJ:2hpCzNkeEpFwLzISPTr+p9D0QZh9u

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks