General

  • Target

    9d0c1d9b11e1ce48d82a2ea03a0709f9_JaffaCakes118

  • Size

    762KB

  • Sample

    241125-wksehaypft

  • MD5

    9d0c1d9b11e1ce48d82a2ea03a0709f9

  • SHA1

    69854a50c08f07ffbb384eaa248616bc429c824f

  • SHA256

    a5c70a268a567eddb9d7a95b9760a273800800fecaa60668c707e2557440e327

  • SHA512

    6f5fb454f256053a5ae925b88df46e434e614992be65a064e1fc0b5f107a7400ae54aacb164b72db0344b6775281e19a3fabf214a04587cc8f617e7ad57c0b71

  • SSDEEP

    12288:j9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/hzbH:tZ1xuVVjfFoynPaVBUR8f+kN10EBVL

Malware Config

Extracted

Family

darkcomet

Botnet

HF

C2

guysf.no-ip.biz:1604

Mutex

DC_MUTEX-CSMN1X9

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    QeC7oBWrh8EE

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

Targets

    • Target

      9d0c1d9b11e1ce48d82a2ea03a0709f9_JaffaCakes118

    • Size

      762KB

    • MD5

      9d0c1d9b11e1ce48d82a2ea03a0709f9

    • SHA1

      69854a50c08f07ffbb384eaa248616bc429c824f

    • SHA256

      a5c70a268a567eddb9d7a95b9760a273800800fecaa60668c707e2557440e327

    • SHA512

      6f5fb454f256053a5ae925b88df46e434e614992be65a064e1fc0b5f107a7400ae54aacb164b72db0344b6775281e19a3fabf214a04587cc8f617e7ad57c0b71

    • SSDEEP

      12288:j9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/hzbH:tZ1xuVVjfFoynPaVBUR8f+kN10EBVL

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Modifies WinLogon for persistence

    • Modifies firewall policy service

    • Modifies security service

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks