General

  • Target

    581991d038f83e174c3d331f7953b09f_JaffaCakes118

  • Size

    1.2MB

  • Sample

    241018-shmjpawamr

  • MD5

    581991d038f83e174c3d331f7953b09f

  • SHA1

    a11290cb527b5afd624db4de8640ce68725e0a1f

  • SHA256

    a4338668c0f1f599d8f3e64b739bb3a03ff79fc743df4e7326eebb3db19876a0

  • SHA512

    c4e9c611647158b4497b6647e7f6fe6c675c0618f193c37cd6c9123ab316fb0770763f7474829bc2e4c712245986bd4cd37964a78a62b63c1f0589873d21ef13

  • SSDEEP

    24576:FFjUKMF5IVOZtZ6sz5ilSB6i9AWJltHZTYtCK/cRgOnmq9g6FFfEhq:FFjC5IVOzNZB6i9AyHZTecOU7m6TME

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

ahmedmisho81.zapto.org:1600

Mutex

DC_MUTEX-R7D4M12

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    HH03ZXKrqJ57

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

Extracted

Family

latentbot

C2

ahmedmisho81.zapto.org

Targets

    • Target

      581991d038f83e174c3d331f7953b09f_JaffaCakes118

    • Size

      1.2MB

    • MD5

      581991d038f83e174c3d331f7953b09f

    • SHA1

      a11290cb527b5afd624db4de8640ce68725e0a1f

    • SHA256

      a4338668c0f1f599d8f3e64b739bb3a03ff79fc743df4e7326eebb3db19876a0

    • SHA512

      c4e9c611647158b4497b6647e7f6fe6c675c0618f193c37cd6c9123ab316fb0770763f7474829bc2e4c712245986bd4cd37964a78a62b63c1f0589873d21ef13

    • SSDEEP

      24576:FFjUKMF5IVOZtZ6sz5ilSB6i9AWJltHZTYtCK/cRgOnmq9g6FFfEhq:FFjC5IVOzNZB6i9AyHZTecOU7m6TME

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • LatentBot

      Modular trojan written in Delphi which has been in-the-wild since 2013.

    • Modifies WinLogon for persistence

    • Modifies firewall policy service

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks