General

  • Target

    edd0bf306c18d503bac24b08d265ce4c_JaffaCakes118

  • Size

    345KB

  • Sample

    241214-jz41mawlft

  • MD5

    edd0bf306c18d503bac24b08d265ce4c

  • SHA1

    0f93d0f8ec3146a625de3edc19c6947bafe37290

  • SHA256

    26123cba2a560a904c2729659a41ccc6be8c827d49bee85d325ae7c642e75dbf

  • SHA512

    b5be2e4e0403c6b23ef2d1fe89e4092b13b7911d932cf325f7eb5296451272c58e59c49cfacf0133325024a140c9d67131e77385a32541380709f5951f3c478f

  • SSDEEP

    6144:NcNYS996KFifeVjBpeExgVTFSXFoMc5RhCaL37ugxcis2yroB+j:NcW7KEZlPzCy377ZYj

Malware Config

Extracted

Family

darkcomet

Attributes
  • gencode

  • install

    false

  • offline_keylogger

    false

  • persistence

    false

Extracted

Family

darkcomet

Botnet

Guest16

C2

192.168.178.36:1604

Mutex

DC_MUTEX-AZN8DW5

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    TGSJa1sEAuZp

  • install

    true

  • offline_keylogger

    false

  • persistence

    true

  • reg_key

    MicroUpdate

Targets

    • Target

      edd0bf306c18d503bac24b08d265ce4c_JaffaCakes118

    • Size

      345KB

    • MD5

      edd0bf306c18d503bac24b08d265ce4c

    • SHA1

      0f93d0f8ec3146a625de3edc19c6947bafe37290

    • SHA256

      26123cba2a560a904c2729659a41ccc6be8c827d49bee85d325ae7c642e75dbf

    • SHA512

      b5be2e4e0403c6b23ef2d1fe89e4092b13b7911d932cf325f7eb5296451272c58e59c49cfacf0133325024a140c9d67131e77385a32541380709f5951f3c478f

    • SSDEEP

      6144:NcNYS996KFifeVjBpeExgVTFSXFoMc5RhCaL37ugxcis2yroB+j:NcW7KEZlPzCy377ZYj

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Modifies WinLogon for persistence

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks