General
-
Target
JaffaCakes118_607bc4ea4898f2c882f87bc7a8f3503d
-
Size
251KB
-
Sample
250101-y7d7havmdp
-
MD5
607bc4ea4898f2c882f87bc7a8f3503d
-
SHA1
f785b8794cee2717fe825b18b6293dc71da239d3
-
SHA256
9b42c96f3be2f7ba8da3f9bcf16b7bcdb9bf0ea85948a1605a66e58ed9e36c06
-
SHA512
ddb45fd390eb7662a896ee46b3026fc8d25d7c5cd9adbe235132d5793f999df9db9e98ecd41b4c6e0fa634c4dd02a720825d6e368f2847fdfaeca935bf3414f5
-
SSDEEP
6144:BcNYS996KFifeVjBpeExgVTFSXFoMc5RhCaL37G:BcW7KEZlPzCy37
Behavioral task
behavioral1
Sample
JaffaCakes118_607bc4ea4898f2c882f87bc7a8f3503d.exe
Resource
win7-20240708-en
Malware Config
Extracted
darkcomet
HackedGuy
89.27.43.217:133
DC_MUTEX-64N579Z
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
9CyCj5Tsvxel
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
MicroUpdate
Targets
-
-
Target
JaffaCakes118_607bc4ea4898f2c882f87bc7a8f3503d
-
Size
251KB
-
MD5
607bc4ea4898f2c882f87bc7a8f3503d
-
SHA1
f785b8794cee2717fe825b18b6293dc71da239d3
-
SHA256
9b42c96f3be2f7ba8da3f9bcf16b7bcdb9bf0ea85948a1605a66e58ed9e36c06
-
SHA512
ddb45fd390eb7662a896ee46b3026fc8d25d7c5cd9adbe235132d5793f999df9db9e98ecd41b4c6e0fa634c4dd02a720825d6e368f2847fdfaeca935bf3414f5
-
SSDEEP
6144:BcNYS996KFifeVjBpeExgVTFSXFoMc5RhCaL37G:BcW7KEZlPzCy37
-
Darkcomet family
-
Modifies WinLogon for persistence
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1