General

  • Target

    793cab4421c321b969ce88f22d90752c_JaffaCakes118

  • Size

    1.4MB

  • Sample

    241028-mvd57axcpg

  • MD5

    793cab4421c321b969ce88f22d90752c

  • SHA1

    55b461d66391147bf8f7c0179f7a0b2abed6d9b5

  • SHA256

    b780a8572b59d2eeb633fd896cc4982508aacee23bce257396a80e7ea29b2bc3

  • SHA512

    b02df864c6ec4c7ebede94b3bf31b66b5332f3e8b4ece9600a2b282dec06885965279adbf36b8e08d590cfcb5aeb0e113a273eb4476c5fc86e321c4cb73e4075

  • SSDEEP

    24576:eaHMv6CorjqnyC8flDAgjk6GECzbMpJgCUwJvfoIfaAl3Ein+ozerISUfE:e1vqjdC8tD5jk6/wbMTgCUaoIfaKb+ok

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

testcybergate.zapto.org:3014

Mutex

DC_MUTEX-F48XL4B

Attributes
  • gencode

    EWr2RqlAQCdR

  • install

    false

  • offline_keylogger

    true

  • persistence

    false

Extracted

Family

latentbot

C2

testcybergate.zapto.org

Targets

    • Target

      793cab4421c321b969ce88f22d90752c_JaffaCakes118

    • Size

      1.4MB

    • MD5

      793cab4421c321b969ce88f22d90752c

    • SHA1

      55b461d66391147bf8f7c0179f7a0b2abed6d9b5

    • SHA256

      b780a8572b59d2eeb633fd896cc4982508aacee23bce257396a80e7ea29b2bc3

    • SHA512

      b02df864c6ec4c7ebede94b3bf31b66b5332f3e8b4ece9600a2b282dec06885965279adbf36b8e08d590cfcb5aeb0e113a273eb4476c5fc86e321c4cb73e4075

    • SSDEEP

      24576:eaHMv6CorjqnyC8flDAgjk6GECzbMpJgCUwJvfoIfaAl3Ein+ozerISUfE:e1vqjdC8tD5jk6/wbMTgCUaoIfaKb+ok

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • LatentBot

      Modular trojan written in Delphi which has been in-the-wild since 2013.

    • Latentbot family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

MITRE ATT&CK Enterprise v15

Tasks