General

  • Target

    dd67f4dcc096eaf0e6d24ffbeb6ab22a_JaffaCakes118

  • Size

    677KB

  • Sample

    241210-g4q88a1nbk

  • MD5

    dd67f4dcc096eaf0e6d24ffbeb6ab22a

  • SHA1

    fdb679646cf9afacab7aabb723844ddf40d47731

  • SHA256

    2695171fe89643108287f83695cbda3d256aeb9ef15c81da2117edf4783848cc

  • SHA512

    b819e723848c9462ac2927c9d0e755dbd8116971ed6690be14a1de069256d2866cc87b934cadf922f8c36d994022fc9c02c95a906b1892ce97f7f70a2db2e908

  • SSDEEP

    12288:yH/6wKKk1QA0gi8cNbn6I+VluyKSKAZ8dtdFqbFjGbYNeGmkVna5y8S6:yH/6wRL1gRcNbnT64/SjK3dFaabgeDU

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

have-fun.hopto.org:1604

Mutex

DC_MUTEX-LX8E21X

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    k2Cmqg9s09U5

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    MicroUpdate

Targets

    • Target

      dd67f4dcc096eaf0e6d24ffbeb6ab22a_JaffaCakes118

    • Size

      677KB

    • MD5

      dd67f4dcc096eaf0e6d24ffbeb6ab22a

    • SHA1

      fdb679646cf9afacab7aabb723844ddf40d47731

    • SHA256

      2695171fe89643108287f83695cbda3d256aeb9ef15c81da2117edf4783848cc

    • SHA512

      b819e723848c9462ac2927c9d0e755dbd8116971ed6690be14a1de069256d2866cc87b934cadf922f8c36d994022fc9c02c95a906b1892ce97f7f70a2db2e908

    • SSDEEP

      12288:yH/6wKKk1QA0gi8cNbn6I+VluyKSKAZ8dtdFqbFjGbYNeGmkVna5y8S6:yH/6wRL1gRcNbnT64/SjK3dFaabgeDU

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Modifies WinLogon for persistence

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks