General

  • Target

    b28d71f5e9a9e74c008f8102923f5d08_JaffaCakes118

  • Size

    1.6MB

  • Sample

    241129-t8t7wswle1

  • MD5

    b28d71f5e9a9e74c008f8102923f5d08

  • SHA1

    a7769e1357506e4b66a0048d18b4c8da1df26378

  • SHA256

    b8b714b79cd5de967763d423693fdd4eee57676eab485bbc3a6aaccf5cda0ba1

  • SHA512

    c59c834e03ca30e0cd408082397d5b715ab5459067809aa5e44c2030e80b6d63c7a605eb96ad78c4dd3cc1abadeef0f70fb80b5c43b6b69f4ee428c1efeae4cd

  • SSDEEP

    24576:saHMv6CorjqnyC8ulDrAZ0P4qgarLj+k3JUiDaiR5RzeJTdK6z:s1vqjdC8YDvP4ParLjrnWiteJTh

Malware Config

Extracted

Family

darkcomet

Botnet

1

C2

hackerman123.zapto.org:1604

91.35.245.232:1604

192.168.2.111:1604

127.0.0.1:1604

Mutex

DC_MUTEX-WJ89VCK

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    MuSbpc6onR2T

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    MicroUpdate

Extracted

Family

latentbot

C2

hackerman123.zapto.org

Targets

    • Target

      b28d71f5e9a9e74c008f8102923f5d08_JaffaCakes118

    • Size

      1.6MB

    • MD5

      b28d71f5e9a9e74c008f8102923f5d08

    • SHA1

      a7769e1357506e4b66a0048d18b4c8da1df26378

    • SHA256

      b8b714b79cd5de967763d423693fdd4eee57676eab485bbc3a6aaccf5cda0ba1

    • SHA512

      c59c834e03ca30e0cd408082397d5b715ab5459067809aa5e44c2030e80b6d63c7a605eb96ad78c4dd3cc1abadeef0f70fb80b5c43b6b69f4ee428c1efeae4cd

    • SSDEEP

      24576:saHMv6CorjqnyC8ulDrAZ0P4qgarLj+k3JUiDaiR5RzeJTdK6z:s1vqjdC8YDvP4ParLjrnWiteJTh

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • LatentBot

      Modular trojan written in Delphi which has been in-the-wild since 2013.

    • Latentbot family

    • Modifies WinLogon for persistence

    • Modifies firewall policy service

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks