General

  • Target

    JaffaCakes118_4752685da9024a854428efa22d28e890

  • Size

    296KB

  • Sample

    250101-e6zl9svlgv

  • MD5

    4752685da9024a854428efa22d28e890

  • SHA1

    8f9200b3b1dde89842a13b7f919e1f2a271a50eb

  • SHA256

    c68a0d0e2e7c63925373033ae2a5a9700b14dfe7847e0f5e339d8ed0be11b758

  • SHA512

    b9eaf73031184b5124e66e877ee02e3ed634f789e5d151fc1cfe8eb2fce263694216121fd68fa832688cec29bb312a090db35ec322a556dbeb3d860a7b3dc783

  • SSDEEP

    6144:w3Uhm3c0q+RzSeZNJwEqh/T265nSDNKubzFUgSCQDPiZTlu4tIXjIa:wEmtrtbqh/hVSMubZUgyPidlBtUH

Malware Config

Extracted

Family

darkcomet

Botnet

Day1

C2

epicdust.servecounterstrike.com:1604

Mutex

DC_MUTEX-FE50JVD

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    85dtHfaBqD8E

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    MicroUpdate

Targets

    • Target

      bitbot_v2.8_SETUP.exe

    • Size

      394KB

    • MD5

      83b9c0ccfc41bcf9900d13d3de74ba3b

    • SHA1

      d2dddf0c6c5e6ce45f3ebf3d89826ed64fdab610

    • SHA256

      32b7afcb5c386847d67df435dd1ee685d7afa39bc0fac4437f054c5546af25dd

    • SHA512

      2181189443bda3126c4e2335d355454eee3c9576292fd9485dc75839c04cf64dc0f13c58db52f202f513d5ff342c688ca1b44f013db66d68423d22b0b5caa139

    • SSDEEP

      6144:gMU81mKGzOr2+krxLCPy95PNbyIn+dmge0qOxS+NfMA90ZnMaN/j:gMdmKWOa+wxWPiPNbDfCS+FMA90ZnD/

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Modifies WinLogon for persistence

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks