General
-
Target
bba9bc42e2c616f5fe42a83dc440b3ae_JaffaCakes118
-
Size
298KB
-
Sample
241203-etndgazkdt
-
MD5
bba9bc42e2c616f5fe42a83dc440b3ae
-
SHA1
29bd2e241961e4a3470776bececa728974b5f142
-
SHA256
b2c9088dc6b52cc189efc5c4898b5d0b17673542b962c2a5e5313aae22adff45
-
SHA512
e8be963396ab0baea74440b27f88d9d62586a7ac761639f6d71477a7d1d5264197003f7b2be8dc3cdc6100d656097f4ba92853b8f75e9a53b146ca82282de41d
-
SSDEEP
6144:F1161OH3pmoqSDcP56APtw8OZikb/WLbbcu8csOKDCokuFnQJNpT6XgW:FJASIP5NPtw8O1b/WLbbfijOokuFJXz
Behavioral task
behavioral1
Sample
bba9bc42e2c616f5fe42a83dc440b3ae_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
darkcomet
slave 7
zapto666.zapto.org:111
sildelanoe2.zapto.org:111
DC_MUTEX-AABY2SY
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
dBJTCCgZ3jHq
-
install
true
-
offline_keylogger
false
-
persistence
true
-
reg_key
MicroUpdate
Extracted
latentbot
sildelanoe2.zapto.org
Targets
-
-
Target
bba9bc42e2c616f5fe42a83dc440b3ae_JaffaCakes118
-
Size
298KB
-
MD5
bba9bc42e2c616f5fe42a83dc440b3ae
-
SHA1
29bd2e241961e4a3470776bececa728974b5f142
-
SHA256
b2c9088dc6b52cc189efc5c4898b5d0b17673542b962c2a5e5313aae22adff45
-
SHA512
e8be963396ab0baea74440b27f88d9d62586a7ac761639f6d71477a7d1d5264197003f7b2be8dc3cdc6100d656097f4ba92853b8f75e9a53b146ca82282de41d
-
SSDEEP
6144:F1161OH3pmoqSDcP56APtw8OZikb/WLbbcu8csOKDCokuFnQJNpT6XgW:FJASIP5NPtw8O1b/WLbbfijOokuFJXz
-
Darkcomet family
-
Latentbot family
-
Modifies WinLogon for persistence
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify Tools
2Modify Registry
4