General

  • Target

    a3f8e3277a2c3d7015960849085387c1_JaffaCakes118

  • Size

    1.2MB

  • Sample

    241126-zbd3asykgt

  • MD5

    a3f8e3277a2c3d7015960849085387c1

  • SHA1

    5924c856c980fcc65ae7cbb973093f71d900c3b4

  • SHA256

    b402426b5246d326209ff063c281bb24965ade165af5cafc80f6ff742a9c021b

  • SHA512

    e6dcab4796a105f97eeb7c658cbc83c356269f8e11cbe0b5cbca4f1454d8227203929d4d72e17124f043ec163f031f56fc64d4160c186b6a345c6eedb87d15d3

  • SSDEEP

    24576:l859kyoiNcTn1dpMRuLxRlzi6u3/A9nqa:lIk0cz1dpMs1RZiH3/A99

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

127.0.0.1:1604

192.168.1.62:1604

77.13.108.22:1604

prototypeee60.zapto.org:1604

Mutex

DC_MUTEX-SH6SBV6

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    8yY5MR1U0Hx2

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

Extracted

Family

latentbot

C2

prototypeee60.zapto.org

Targets

    • Target

      a3f8e3277a2c3d7015960849085387c1_JaffaCakes118

    • Size

      1.2MB

    • MD5

      a3f8e3277a2c3d7015960849085387c1

    • SHA1

      5924c856c980fcc65ae7cbb973093f71d900c3b4

    • SHA256

      b402426b5246d326209ff063c281bb24965ade165af5cafc80f6ff742a9c021b

    • SHA512

      e6dcab4796a105f97eeb7c658cbc83c356269f8e11cbe0b5cbca4f1454d8227203929d4d72e17124f043ec163f031f56fc64d4160c186b6a345c6eedb87d15d3

    • SSDEEP

      24576:l859kyoiNcTn1dpMRuLxRlzi6u3/A9nqa:lIk0cz1dpMs1RZiH3/A99

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • LatentBot

      Modular trojan written in Delphi which has been in-the-wild since 2013.

    • Latentbot family

    • Modifies WinLogon for persistence

    • Modifies firewall policy service

    • Modifies security service

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks