General

  • Target

    87b1557a6486ef0dad75b2d9f4b9ec86_JaffaCakes118

  • Size

    253KB

  • Sample

    241102-zqhc9sxrgp

  • MD5

    87b1557a6486ef0dad75b2d9f4b9ec86

  • SHA1

    1daf68ee5f08ef0c0f55b4b6a799440dc175281b

  • SHA256

    e35661892e57a9dcf8fd0d99eaa61422ca765a68a52ef60d12df488321800a2e

  • SHA512

    3bb7412f12dbf3e463d31d503ed74a6d9d3ee6bd229a826849c88f1c9d2551300f1330952d413f2cb0dfc3aeb7e7e5f16a33a8e8b8f9bf0ebef099e2d5398e1c

  • SSDEEP

    6144:XD7cY2fgssM7Wirg9KXylmRiL+QMeC/i6isqX7UovnONztByipwxZ:Xl8E4w5huat7UovONzbXw

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

sameg.no-ip.biz:1604

Mutex

DC_MUTEX-F54S21D

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    QrEhKkKT5N4s

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

Targets

    • Target

      87b1557a6486ef0dad75b2d9f4b9ec86_JaffaCakes118

    • Size

      253KB

    • MD5

      87b1557a6486ef0dad75b2d9f4b9ec86

    • SHA1

      1daf68ee5f08ef0c0f55b4b6a799440dc175281b

    • SHA256

      e35661892e57a9dcf8fd0d99eaa61422ca765a68a52ef60d12df488321800a2e

    • SHA512

      3bb7412f12dbf3e463d31d503ed74a6d9d3ee6bd229a826849c88f1c9d2551300f1330952d413f2cb0dfc3aeb7e7e5f16a33a8e8b8f9bf0ebef099e2d5398e1c

    • SSDEEP

      6144:XD7cY2fgssM7Wirg9KXylmRiL+QMeC/i6isqX7UovnONztByipwxZ:Xl8E4w5huat7UovONzbXw

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Modifies WinLogon for persistence

    • Windows security bypass

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks