General

  • Target

    a91672ac89d1826a72f3f71e57f5b13d_JaffaCakes118

  • Size

    467KB

  • Sample

    241127-wz9x4a1kgp

  • MD5

    a91672ac89d1826a72f3f71e57f5b13d

  • SHA1

    25c842879a8658dd70658b7ffd5669b98cc61f0d

  • SHA256

    d8ba821aa37d8c83ee00f809de729197eb340e17348274eec26469a3be34f894

  • SHA512

    dfa07f9ea006ac36cb4ab36a6d4e10249d0452fbec7a677b66b23c1d91ef4e803cc019446d7309f49db844675e978a74f9cb28fe5e2289c77dd37681e2b8e13d

  • SSDEEP

    12288:tpW7YfiziEBcpY08g0CSbEcZt7fsmrwN0DCHh:PfGigo8gXMwNwCB

Malware Config

Extracted

Family

darkcomet

Botnet

New_server_Crypter

C2

leetaka1337.no-ip.org:1604

Mutex

DC_MUTEX-K01XBXU

Attributes
  • InstallPath

    MSDCSC\winhost.exe

  • gencode

    cattbKvVMm69

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    MicroUpdate

Targets

    • Target

      a91672ac89d1826a72f3f71e57f5b13d_JaffaCakes118

    • Size

      467KB

    • MD5

      a91672ac89d1826a72f3f71e57f5b13d

    • SHA1

      25c842879a8658dd70658b7ffd5669b98cc61f0d

    • SHA256

      d8ba821aa37d8c83ee00f809de729197eb340e17348274eec26469a3be34f894

    • SHA512

      dfa07f9ea006ac36cb4ab36a6d4e10249d0452fbec7a677b66b23c1d91ef4e803cc019446d7309f49db844675e978a74f9cb28fe5e2289c77dd37681e2b8e13d

    • SSDEEP

      12288:tpW7YfiziEBcpY08g0CSbEcZt7fsmrwN0DCHh:PfGigo8gXMwNwCB

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Modifies WinLogon for persistence

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks