General

  • Target

    9fcf12283d2cdcf26403bff7fb401f4a_JaffaCakes118

  • Size

    1.1MB

  • Sample

    241126-e2clya1khk

  • MD5

    9fcf12283d2cdcf26403bff7fb401f4a

  • SHA1

    8ad723a588c0305a76b7da44ac325c465806f291

  • SHA256

    cfc2d17d7fe68e92efbbb7aa7b73881cb34abf1e7f4339017262d5e88bc6e1b2

  • SHA512

    ec4cc0d6cf86034f088e94a9b8eb725da2988b2ee3c27520e1a2dc2c163abe406dc9565ed84cb74d4cca51a772282b125d124331a024d8f5345fca63c80c3d8e

  • SSDEEP

    24576:5MHjjQ5pLGmTqqGf4rL9EGlZH+scaEulF5xoC/5Iq:aAHim+5DGq5duln2E

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

ultr4fucker.no-ip.org:1604

ultr4fucker.no-ip.org:1602

Mutex

DC_MUTEX-3S67JWT

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    wauaoWNzC5fn

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    svchost

Targets

    • Target

      9fcf12283d2cdcf26403bff7fb401f4a_JaffaCakes118

    • Size

      1.1MB

    • MD5

      9fcf12283d2cdcf26403bff7fb401f4a

    • SHA1

      8ad723a588c0305a76b7da44ac325c465806f291

    • SHA256

      cfc2d17d7fe68e92efbbb7aa7b73881cb34abf1e7f4339017262d5e88bc6e1b2

    • SHA512

      ec4cc0d6cf86034f088e94a9b8eb725da2988b2ee3c27520e1a2dc2c163abe406dc9565ed84cb74d4cca51a772282b125d124331a024d8f5345fca63c80c3d8e

    • SSDEEP

      24576:5MHjjQ5pLGmTqqGf4rL9EGlZH+scaEulF5xoC/5Iq:aAHim+5DGq5duln2E

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Modifies WinLogon for persistence

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks