General

  • Target

    83c318fb4da8950bf50f8533ef1d293b_JaffaCakes118

  • Size

    564KB

  • Sample

    241031-3wv34avbrb

  • MD5

    83c318fb4da8950bf50f8533ef1d293b

  • SHA1

    37d890ec897788f21e958e31a2a7275a17784f0d

  • SHA256

    901f4ee6d85a6727cf4698ee30ebd8c1898350fc55f644ce3c0417d9669d27ac

  • SHA512

    468ecd34af6f61d2dbe883213f7fbe73152f8efed012c4a2b0fc8483b3810c57e55e18ebca6f51bc1e9a30c418e530b3e075c94f32076f86eff1ade0b1ca2771

  • SSDEEP

    12288:5Mu4Ll1rkHbSuPpjrYIOdHTPbZY/KArakBo9O:5MuAl1SbSyjrYnz9YC0u4

Malware Config

Targets

    • Target

      83c318fb4da8950bf50f8533ef1d293b_JaffaCakes118

    • Size

      564KB

    • MD5

      83c318fb4da8950bf50f8533ef1d293b

    • SHA1

      37d890ec897788f21e958e31a2a7275a17784f0d

    • SHA256

      901f4ee6d85a6727cf4698ee30ebd8c1898350fc55f644ce3c0417d9669d27ac

    • SHA512

      468ecd34af6f61d2dbe883213f7fbe73152f8efed012c4a2b0fc8483b3810c57e55e18ebca6f51bc1e9a30c418e530b3e075c94f32076f86eff1ade0b1ca2771

    • SSDEEP

      12288:5Mu4Ll1rkHbSuPpjrYIOdHTPbZY/KArakBo9O:5MuAl1SbSyjrYnz9YC0u4

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Modifies WinLogon for persistence

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks