General

  • Target

    921508979303b9ae5bc51c919dcb282e_JaffaCakes118

  • Size

    403KB

  • Sample

    241124-c4117szmdy

  • MD5

    921508979303b9ae5bc51c919dcb282e

  • SHA1

    c80a54549a4523857a5b685d46acf52ca52bd98f

  • SHA256

    64afb63790cadc4d8d59a851179aa0c1257df041eb1f8c01d7c3f3446a10d9c1

  • SHA512

    89997d3551bc0c97e56075bc1bb4b4947f90409b5ed5eb70d1bc7b11aa8ca6d943ad21df4f3785a3f68c98336944eaaca044301f5e794e237292aa50b5be765a

  • SSDEEP

    6144:At2XAffQFZrbpR7wxIjYkfa0qpmAHvH3A9diV0GIuh65xvySYBFwj+:+Hak0E06xQC0bueBcLK+

Malware Config

Extracted

Family

darkcomet

Botnet

Ilover

C2

fashionloverph.no-ip.info:1809

Mutex

DC_MUTEX-J2V2VRJ

Attributes
  • gencode

    R4ltDW8X5sNf

  • install

    false

  • offline_keylogger

    true

  • persistence

    false

Targets

    • Target

      921508979303b9ae5bc51c919dcb282e_JaffaCakes118

    • Size

      403KB

    • MD5

      921508979303b9ae5bc51c919dcb282e

    • SHA1

      c80a54549a4523857a5b685d46acf52ca52bd98f

    • SHA256

      64afb63790cadc4d8d59a851179aa0c1257df041eb1f8c01d7c3f3446a10d9c1

    • SHA512

      89997d3551bc0c97e56075bc1bb4b4947f90409b5ed5eb70d1bc7b11aa8ca6d943ad21df4f3785a3f68c98336944eaaca044301f5e794e237292aa50b5be765a

    • SSDEEP

      6144:At2XAffQFZrbpR7wxIjYkfa0qpmAHvH3A9diV0GIuh65xvySYBFwj+:+Hak0E06xQC0bueBcLK+

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Modifies firewall policy service

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks