General

  • Target

    bba9bc42e2c616f5fe42a83dc440b3ae_JaffaCakes118

  • Size

    298KB

  • Sample

    241203-etndgazkdt

  • MD5

    bba9bc42e2c616f5fe42a83dc440b3ae

  • SHA1

    29bd2e241961e4a3470776bececa728974b5f142

  • SHA256

    b2c9088dc6b52cc189efc5c4898b5d0b17673542b962c2a5e5313aae22adff45

  • SHA512

    e8be963396ab0baea74440b27f88d9d62586a7ac761639f6d71477a7d1d5264197003f7b2be8dc3cdc6100d656097f4ba92853b8f75e9a53b146ca82282de41d

  • SSDEEP

    6144:F1161OH3pmoqSDcP56APtw8OZikb/WLbbcu8csOKDCokuFnQJNpT6XgW:FJASIP5NPtw8O1b/WLbbfijOokuFJXz

Malware Config

Extracted

Family

darkcomet

Botnet

slave 7

C2

zapto666.zapto.org:111

sildelanoe2.zapto.org:111

Mutex

DC_MUTEX-AABY2SY

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    dBJTCCgZ3jHq

  • install

    true

  • offline_keylogger

    false

  • persistence

    true

  • reg_key

    MicroUpdate

Extracted

Family

latentbot

C2

sildelanoe2.zapto.org

Targets

    • Target

      bba9bc42e2c616f5fe42a83dc440b3ae_JaffaCakes118

    • Size

      298KB

    • MD5

      bba9bc42e2c616f5fe42a83dc440b3ae

    • SHA1

      29bd2e241961e4a3470776bececa728974b5f142

    • SHA256

      b2c9088dc6b52cc189efc5c4898b5d0b17673542b962c2a5e5313aae22adff45

    • SHA512

      e8be963396ab0baea74440b27f88d9d62586a7ac761639f6d71477a7d1d5264197003f7b2be8dc3cdc6100d656097f4ba92853b8f75e9a53b146ca82282de41d

    • SSDEEP

      6144:F1161OH3pmoqSDcP56APtw8OZikb/WLbbcu8csOKDCokuFnQJNpT6XgW:FJASIP5NPtw8O1b/WLbbfijOokuFJXz

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • LatentBot

      Modular trojan written in Delphi which has been in-the-wild since 2013.

    • Latentbot family

    • Modifies WinLogon for persistence

    • Windows security bypass

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks