General

  • Target

    98d40e12110f61c5c40754fb5d15bceb_JaffaCakes118

  • Size

    263KB

  • Sample

    241125-dk2n3avpaw

  • MD5

    98d40e12110f61c5c40754fb5d15bceb

  • SHA1

    7ed300100cf582482a297d92c54d9bf3b3ab9ba1

  • SHA256

    b918d3de5c87e80f6dd7cb945bece30325b7700fed75c32081753c5894d1919e

  • SHA512

    b476b19aaa8b9f17cecad4f8a48d6808d122db7c2c43c4a9357041307231a160178f96d994343367ae522acef81b84bce46ef2d38fe7c655a64ed5f77b1bb16a

  • SSDEEP

    6144:SamZcalIRPnhbNj9OhqnZIOl2GWj5WbwezOCocbu:2ZcaCphGIZIOcGWjsvOC0

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

mrhomer228.ddns.net:1606

Mutex

DC_MUTEX-FKPEL23

Attributes
  • InstallPath

    windownsys.exe

  • gencode

    HsrmtxZDk9Q9

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    windownsys.exe

Targets

    • Target

      VKBOT.exe

    • Size

      658KB

    • MD5

      e1013f580361131d2d983a866c14f68f

    • SHA1

      fe0bca3bd6b437b551bc623a11d0e4ce92c095dc

    • SHA256

      6a8ecebda423b2979e92809e8567861480e9ec06422eec0399746e06275214cc

    • SHA512

      1749a583805d3d784bfa63f0d82f936ecd320ff5d3ba10146f0530b63ad976908629226bc81e7e7071d71a956f7c4278b85ff3a240bc9d7c089678c3fe4e54f5

    • SSDEEP

      12288:S9HMeUmcufrvA3kb445UEJ2jsWiD4EvFuu4cNgZhCiZKD/XdyFd:+iBIGkbxqEcjsWiDxguehC2SG

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Modifies WinLogon for persistence

    • Modifies firewall policy service

    • Modifies security service

    • Windows security bypass

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks