General

  • Target

    JaffaCakes118_615d633b0e7337ef925cd3d5b2de15a1

  • Size

    739KB

  • Sample

    250101-3tadlstlar

  • MD5

    615d633b0e7337ef925cd3d5b2de15a1

  • SHA1

    55dc10ff372c006b8fd7aabbfa6e2d66ba0ca7a1

  • SHA256

    a950ba583d40737b5e52aa9adda09d5b38d1a2a316a44fc0fc36c12f5e46693b

  • SHA512

    49e6bdfc51d6ac0fb62f2b54f0c647c1e127e26e58e393e59056a33306071a4f43a5aaa0ed66fe54f5b0116bbc1a8cfaa925785b1f46677a276a977a7eda1b72

  • SSDEEP

    12288:C9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/hF9Vel4Y:uZ1xuVVjfFoynPaVBUR8f+kN10EBXyld

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

lemonxrat.no-ip.org:4782

Mutex

DC_MUTEX-FWDE5J0

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    A8VBRQNxecXD

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    MicroUpdate

Targets

    • Target

      JaffaCakes118_615d633b0e7337ef925cd3d5b2de15a1

    • Size

      739KB

    • MD5

      615d633b0e7337ef925cd3d5b2de15a1

    • SHA1

      55dc10ff372c006b8fd7aabbfa6e2d66ba0ca7a1

    • SHA256

      a950ba583d40737b5e52aa9adda09d5b38d1a2a316a44fc0fc36c12f5e46693b

    • SHA512

      49e6bdfc51d6ac0fb62f2b54f0c647c1e127e26e58e393e59056a33306071a4f43a5aaa0ed66fe54f5b0116bbc1a8cfaa925785b1f46677a276a977a7eda1b72

    • SSDEEP

      12288:C9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/hF9Vel4Y:uZ1xuVVjfFoynPaVBUR8f+kN10EBXyld

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Modifies WinLogon for persistence

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks