General

  • Target

    5a998b58982968c8b35585f8b7509d3c_JaffaCakes118

  • Size

    350KB

  • Sample

    241019-dybpsswfnk

  • MD5

    5a998b58982968c8b35585f8b7509d3c

  • SHA1

    10bc0bf12dfb10267a671249a3c6b7586230bb02

  • SHA256

    e36e5cab75ee373765d6ca5675f920d0ce9afe3203ac64dd36ee658ef6fdff19

  • SHA512

    e91ccc719bd9f0ab8c6324ae5dfe623f9eec0d5e47039cc99c12e171de75c45da56242adea3e6b462ad822829c0c5234da9e6118378494641c68f96b8a29eccd

  • SSDEEP

    6144:lD7cY2fgssM7Wirg9KXylmRiL+QMeC/i6isqX7UovnONztByipwxZqu:ll8E4w5huat7UovONzbXw

Malware Config

Extracted

Family

darkcomet

Botnet

bulbul

C2

shonk.no-ip.biz:1604

Mutex

DC_MUTEX-XNC0BWQ

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    gb8tsVvY5V3X

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    MicroUpdate

Targets

    • Target

      5a998b58982968c8b35585f8b7509d3c_JaffaCakes118

    • Size

      350KB

    • MD5

      5a998b58982968c8b35585f8b7509d3c

    • SHA1

      10bc0bf12dfb10267a671249a3c6b7586230bb02

    • SHA256

      e36e5cab75ee373765d6ca5675f920d0ce9afe3203ac64dd36ee658ef6fdff19

    • SHA512

      e91ccc719bd9f0ab8c6324ae5dfe623f9eec0d5e47039cc99c12e171de75c45da56242adea3e6b462ad822829c0c5234da9e6118378494641c68f96b8a29eccd

    • SSDEEP

      6144:lD7cY2fgssM7Wirg9KXylmRiL+QMeC/i6isqX7UovnONztByipwxZqu:ll8E4w5huat7UovONzbXw

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks