General

  • Target

    d14575849435412ce18800cc30a37f50_JaffaCakes118

  • Size

    756KB

  • Sample

    241207-h9rydaslgw

  • MD5

    d14575849435412ce18800cc30a37f50

  • SHA1

    d987e6e1102cbb9df1a5dcdcaf8176396be9b0df

  • SHA256

    a5d3c0bd00bbefa25116e2f7db501d27ef8d4cc3823c1a61e3e58de2c38488dd

  • SHA512

    e415bb3b28675b14f1978dfcdda8db90de33376c2143bab98a040f04c939348cf0cd3800683abc1f4a6ab613b4db0f62227fe005672cc24d5a43b3c66a37ecbc

  • SSDEEP

    12288:y9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/hBbHh:eZ1xuVVjfFoynPaVBUR8f+kN10EBHzh

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

alimuhsin1996.no-ip.org:1604

Mutex

DC_MUTEX-HX4WBAX

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    47335WtAtC2L

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

Targets

    • Target

      d14575849435412ce18800cc30a37f50_JaffaCakes118

    • Size

      756KB

    • MD5

      d14575849435412ce18800cc30a37f50

    • SHA1

      d987e6e1102cbb9df1a5dcdcaf8176396be9b0df

    • SHA256

      a5d3c0bd00bbefa25116e2f7db501d27ef8d4cc3823c1a61e3e58de2c38488dd

    • SHA512

      e415bb3b28675b14f1978dfcdda8db90de33376c2143bab98a040f04c939348cf0cd3800683abc1f4a6ab613b4db0f62227fe005672cc24d5a43b3c66a37ecbc

    • SSDEEP

      12288:y9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/hBbHh:eZ1xuVVjfFoynPaVBUR8f+kN10EBHzh

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Modifies WinLogon for persistence

    • Modifies firewall policy service

    • Modifies security service

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks