General

  • Target

    c2af2420eaf11969a278b94b8765c75a_JaffaCakes118

  • Size

    1.1MB

  • Sample

    241204-qf7ezawncz

  • MD5

    c2af2420eaf11969a278b94b8765c75a

  • SHA1

    1d3a1bb3f70980a45d46258b9378ec549f8517d4

  • SHA256

    4b286b592fa6d26241ab969bae236d4952457f2188d97cc406992008dc060768

  • SHA512

    4569277ce9cf20e0174b76053f04e5382ea44b19236c51f6c13a6ff798f2e4b5ee0ae7c7e1c1406b98533142016722dd4410d00551a146b58c9a8b2ca7747e00

  • SSDEEP

    24576:H0DjRp88Fx2ejNTv7ka4Efs+cjiXbfLeQHtBzT6pw:Hij8o2+NbcjFirfLJHtBzTKw

Malware Config

Extracted

Family

darkcomet

Botnet

OT-10aug

C2

h23.us.to:65432

t4rt4r.zapto.org:9384

Mutex

DC_MUTEX-742F3S6

Attributes
  • InstallPath

    W1Nrar\svchost.exe

  • gencode

    wB67Vbr5dSJp

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    Host Process for Windows Services

Targets

    • Target

      setup1.56.exe

    • Size

      1.1MB

    • MD5

      80a6f592279ea5ee33110734677e5d62

    • SHA1

      15a6965cc45a865f94fb05f3931d27acba174415

    • SHA256

      dde6d8365ab5c6e79d83754deaa326e3cf649d5793270fbddecfbd16f42f9262

    • SHA512

      9a495f0091e00b9ca0e93bd18c348dbeef8c788a9825b283b75912b50b6ca6ac2192a846a47f77494589ec5963407fc85669f6aeac5c826e777d2dc54dd79960

    • SSDEEP

      24576:dYi0aeKVUQBoBsrjOP2mnQQsMEqs1MLbp68xcjuJmSOn79F3vqu:dYiLeK7IsrjOP2WNsCs1MLrxUuJm/n7f

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Modifies WinLogon for persistence

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks