General
-
Target
JaffaCakes118_615d633b0e7337ef925cd3d5b2de15a1
-
Size
739KB
-
Sample
250101-3tadlstlar
-
MD5
615d633b0e7337ef925cd3d5b2de15a1
-
SHA1
55dc10ff372c006b8fd7aabbfa6e2d66ba0ca7a1
-
SHA256
a950ba583d40737b5e52aa9adda09d5b38d1a2a316a44fc0fc36c12f5e46693b
-
SHA512
49e6bdfc51d6ac0fb62f2b54f0c647c1e127e26e58e393e59056a33306071a4f43a5aaa0ed66fe54f5b0116bbc1a8cfaa925785b1f46677a276a977a7eda1b72
-
SSDEEP
12288:C9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/hF9Vel4Y:uZ1xuVVjfFoynPaVBUR8f+kN10EBXyld
Behavioral task
behavioral1
Sample
JaffaCakes118_615d633b0e7337ef925cd3d5b2de15a1.exe
Resource
win7-20240903-en
Malware Config
Extracted
darkcomet
Guest16
lemonxrat.no-ip.org:4782
DC_MUTEX-FWDE5J0
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
A8VBRQNxecXD
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
MicroUpdate
Targets
-
-
Target
JaffaCakes118_615d633b0e7337ef925cd3d5b2de15a1
-
Size
739KB
-
MD5
615d633b0e7337ef925cd3d5b2de15a1
-
SHA1
55dc10ff372c006b8fd7aabbfa6e2d66ba0ca7a1
-
SHA256
a950ba583d40737b5e52aa9adda09d5b38d1a2a316a44fc0fc36c12f5e46693b
-
SHA512
49e6bdfc51d6ac0fb62f2b54f0c647c1e127e26e58e393e59056a33306071a4f43a5aaa0ed66fe54f5b0116bbc1a8cfaa925785b1f46677a276a977a7eda1b72
-
SSDEEP
12288:C9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/hF9Vel4Y:uZ1xuVVjfFoynPaVBUR8f+kN10EBXyld
-
Darkcomet family
-
Modifies WinLogon for persistence
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1