General
-
Target
9c943557b7d3da63c59959399a2d955f_JaffaCakes118
-
Size
1.2MB
-
Sample
241125-tqfa1s1qbj
-
MD5
9c943557b7d3da63c59959399a2d955f
-
SHA1
e9bf91d66e31402f9572d66ea5af15144a7d3477
-
SHA256
af6488903f41964f76e28c004f8cab733ce7a2a87c29eab6f38793e0ce852b1c
-
SHA512
f912bbe7b668eca5c2e0d73af337e13d34aa75fcd2da111cea56a9d2db483f3c0eadd6311686a044a77bb05c27236cef7de7225d02dabfaeb56363946cb445ff
-
SSDEEP
24576:LGNlGewemxU45pCSJRHawJQEo9Ua2N7ocO2Z9SE8dszshLJvSbrFv0dOTu+Gd:4lGewfC45cu1JuEUUa25ocOdErzshd0M
Static task
static1
Behavioral task
behavioral1
Sample
Программа.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Программа.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
darkcomet
wuàuclt Cant kill
minedroid.ddns.net:1604
minedroid1.ddns.net:1604
minedroid2.ddns.net:1604
minedroid.zapto.org:1604
DC_MUTEX-WAY5XHM
-
InstallPath
Sys32\wu�uclt.exe
-
gencode
u20uH1Gywf95
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
Windows Update
Targets
-
-
Target
Программа.exe
-
Size
1.3MB
-
MD5
4fe5233fe247d7fe49ce80e8ea123822
-
SHA1
31b52c9c20f168cc13dc9a65f3cb3fa895dccfa8
-
SHA256
08915c724cd73b5f0272eeda53c2f86ba371521520f04d826ad171a564eb6f63
-
SHA512
824094053dff9a6cfa2279feb80ad7c638eda0c4517aa8f9c8dbb500bfda6ef40f6cd369b35bdfc098eb9f65572c9e561dc4b2921f7c34b0a0f3b48af25b81b5
-
SSDEEP
24576:QNQ0lNT0jhJgZUdYuWq1V4/LkLSL9tYavX5c3Nql1hVTSjCeCrz:H0HShJmEY8+/LB9tYaxc3Ng1hVZ7z
-
Darkcomet family
-
Modifies WinLogon for persistence
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
3