General
-
Target
c2af2420eaf11969a278b94b8765c75a_JaffaCakes118
-
Size
1.1MB
-
Sample
241204-qf7ezawncz
-
MD5
c2af2420eaf11969a278b94b8765c75a
-
SHA1
1d3a1bb3f70980a45d46258b9378ec549f8517d4
-
SHA256
4b286b592fa6d26241ab969bae236d4952457f2188d97cc406992008dc060768
-
SHA512
4569277ce9cf20e0174b76053f04e5382ea44b19236c51f6c13a6ff798f2e4b5ee0ae7c7e1c1406b98533142016722dd4410d00551a146b58c9a8b2ca7747e00
-
SSDEEP
24576:H0DjRp88Fx2ejNTv7ka4Efs+cjiXbfLeQHtBzT6pw:Hij8o2+NbcjFirfLJHtBzTKw
Behavioral task
behavioral1
Sample
setup1.56.exe
Resource
win7-20240903-en
Malware Config
Extracted
darkcomet
OT-10aug
h23.us.to:65432
t4rt4r.zapto.org:9384
DC_MUTEX-742F3S6
-
InstallPath
W1Nrar\svchost.exe
-
gencode
wB67Vbr5dSJp
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
Host Process for Windows Services
Targets
-
-
Target
setup1.56.exe
-
Size
1.1MB
-
MD5
80a6f592279ea5ee33110734677e5d62
-
SHA1
15a6965cc45a865f94fb05f3931d27acba174415
-
SHA256
dde6d8365ab5c6e79d83754deaa326e3cf649d5793270fbddecfbd16f42f9262
-
SHA512
9a495f0091e00b9ca0e93bd18c348dbeef8c788a9825b283b75912b50b6ca6ac2192a846a47f77494589ec5963407fc85669f6aeac5c826e777d2dc54dd79960
-
SSDEEP
24576:dYi0aeKVUQBoBsrjOP2mnQQsMEqs1MLbp68xcjuJmSOn79F3vqu:dYiLeK7IsrjOP2WNsCs1MLrxUuJm/n7f
-
Darkcomet family
-
Modifies WinLogon for persistence
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1