General

  • Target

    5691f8daf89fcb97032f8ab5b4d671db_JaffaCakes118

  • Size

    1.1MB

  • Sample

    241018-k116ssybng

  • MD5

    5691f8daf89fcb97032f8ab5b4d671db

  • SHA1

    8a7f6d40e5c44cc48e847806683cb419ed345f11

  • SHA256

    776d07a69fd0780e421400e5eb3d6469195d161eb063f712add08f25c6077fed

  • SHA512

    dd1d6f00c2e81af8daf8402390847028096b6746667b839bf8ee4ee13fde901f6bcebcb964deb041b59289befc1501cf6d6f59cebf70a8ab95d692dc58dd391e

  • SSDEEP

    24576:M29edV3EqRFllOCq4Bj5g13isqB4wWbouQ:D9a3FrlHq4vjsqB4wgK

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Extracted

Family

darkcomet

Botnet

Guest 777

C2

magnumbiz2.no-ip.biz:1000

Mutex

DC_MUTEX-WUY2B69

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    lbwAN2cQj9ve

  • install

    true

  • offline_keylogger

    true

  • password

    123456

  • persistence

    false

  • reg_key

    MicroUpdate

Targets

    • Target

      5691f8daf89fcb97032f8ab5b4d671db_JaffaCakes118

    • Size

      1.1MB

    • MD5

      5691f8daf89fcb97032f8ab5b4d671db

    • SHA1

      8a7f6d40e5c44cc48e847806683cb419ed345f11

    • SHA256

      776d07a69fd0780e421400e5eb3d6469195d161eb063f712add08f25c6077fed

    • SHA512

      dd1d6f00c2e81af8daf8402390847028096b6746667b839bf8ee4ee13fde901f6bcebcb964deb041b59289befc1501cf6d6f59cebf70a8ab95d692dc58dd391e

    • SSDEEP

      24576:M29edV3EqRFllOCq4Bj5g13isqB4wWbouQ:D9a3FrlHq4vjsqB4wgK

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks