General

  • Target

    9a4f987eb22834759d7bbc2ae1d49823_JaffaCakes118

  • Size

    681KB

  • Sample

    241125-j9ajrsxndx

  • MD5

    9a4f987eb22834759d7bbc2ae1d49823

  • SHA1

    2c1e657a45a1538c1fffe458f250b8d50098d737

  • SHA256

    ab112de3538c1020e414ee8ff1cbbe73aaee47d6ef962ed7fced0375c309c1c1

  • SHA512

    812a9a890f1ca4da215e413658e767ee5bd32edeb54ca8383f32288456f5b3187992951b383aac4dc7eb0a1c9aefbc2f99c995f658ce4a929a5c7fe51b964df3

  • SSDEEP

    12288:+k0QVlhmPojAPTMEsUTg0oChO/Q2JbsbjPbN5qhRTtYe3f+Iw86k/9/+yf:T0QRWoJEfg0oChGdJQbjPbNW5tYeP+GV

Malware Config

Extracted

Family

darkcomet

Botnet

Kurban

C2

badgame33.no-ip.org:1604

Mutex

DC_MUTEX-F54S21D

Attributes
  • InstallPath

    svchost/svchost.exe

  • gencode

    ttqwafpujvHu

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

Targets

    • Target

      9a4f987eb22834759d7bbc2ae1d49823_JaffaCakes118

    • Size

      681KB

    • MD5

      9a4f987eb22834759d7bbc2ae1d49823

    • SHA1

      2c1e657a45a1538c1fffe458f250b8d50098d737

    • SHA256

      ab112de3538c1020e414ee8ff1cbbe73aaee47d6ef962ed7fced0375c309c1c1

    • SHA512

      812a9a890f1ca4da215e413658e767ee5bd32edeb54ca8383f32288456f5b3187992951b383aac4dc7eb0a1c9aefbc2f99c995f658ce4a929a5c7fe51b964df3

    • SSDEEP

      12288:+k0QVlhmPojAPTMEsUTg0oChO/Q2JbsbjPbN5qhRTtYe3f+Iw86k/9/+yf:T0QRWoJEfg0oChGdJQbjPbNW5tYeP+GV

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Modifies WinLogon for persistence

    • Modifies firewall policy service

    • Modifies security service

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Windows security modification

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks