General

  • Target

    66bf2bd6bcd6c3a39c5499a68a63e756_JaffaCakes118

  • Size

    1.1MB

  • Sample

    241021-pymb3swcpn

  • MD5

    66bf2bd6bcd6c3a39c5499a68a63e756

  • SHA1

    839c75ada4d42132b318e8485af1bef13f161f7a

  • SHA256

    05d8b7fd8054a5edda812894f1eab9d3fb91e18035851b1caed217a6bde18c41

  • SHA512

    ac894fa159a50a43b493c69bf397640d3356a8803f1edbf53aa95d256ebee3df21a02ef5767b1388ad3f5636b4b96f6e9a128b8906ee651b12640c8f01ed6739

  • SSDEEP

    24576:OSTr6jNMfUpY99HJnRigrOy4GSJcH+ns4:V6jXm999RiqOyiJceb

Malware Config

Targets

    • Target

      66bf2bd6bcd6c3a39c5499a68a63e756_JaffaCakes118

    • Size

      1.1MB

    • MD5

      66bf2bd6bcd6c3a39c5499a68a63e756

    • SHA1

      839c75ada4d42132b318e8485af1bef13f161f7a

    • SHA256

      05d8b7fd8054a5edda812894f1eab9d3fb91e18035851b1caed217a6bde18c41

    • SHA512

      ac894fa159a50a43b493c69bf397640d3356a8803f1edbf53aa95d256ebee3df21a02ef5767b1388ad3f5636b4b96f6e9a128b8906ee651b12640c8f01ed6739

    • SSDEEP

      24576:OSTr6jNMfUpY99HJnRigrOy4GSJcH+ns4:V6jXm999RiqOyiJceb

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Modifies firewall policy service

    • UAC bypass

    • Windows security bypass

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Windows security modification

    • Checks for any installed AV software in registry

    • Checks whether UAC is enabled

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Network Share Discovery

      Attempt to gather information on host network.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks