General

  • Target

    JaffaCakes118_69cc617fef29c0a1e882cc41bb193548

  • Size

    1.1MB

  • Sample

    250103-dd3yjszjhl

  • MD5

    69cc617fef29c0a1e882cc41bb193548

  • SHA1

    9c33a92364491d9604a66362c7ae20299b3a7cdf

  • SHA256

    18fe2153f5dc3550d3e8e4d6196cc2379df48b40b0573b2e8361a0163c736005

  • SHA512

    18885e876690c1e61eef968ddbb954e6d597f70d11caad7f7dea268212d9f0ec30b192559e13989525977e63112634a361a71b9504524c835049ecce07ee4c42

  • SSDEEP

    12288:kpU9b5pYXaiD893Y3GliEB+VF1R89Q9Xxr/v/tF0ZS/iGDnl724MIc5JOa0EFmDj:N9b43C3laV1n7qeryMsRVWQf7QTr

Malware Config

Extracted

Family

darkcomet

Botnet

Cyber

C2

bll3bll3.no-ip.biz:1604

Mutex

DC_MUTEX-0VT3WQP

Attributes
  • gencode

    4z0NyKX3sBWH

  • install

    false

  • offline_keylogger

    true

  • password

    123456

  • persistence

    false

Targets

    • Target

      JaffaCakes118_69cc617fef29c0a1e882cc41bb193548

    • Size

      1.1MB

    • MD5

      69cc617fef29c0a1e882cc41bb193548

    • SHA1

      9c33a92364491d9604a66362c7ae20299b3a7cdf

    • SHA256

      18fe2153f5dc3550d3e8e4d6196cc2379df48b40b0573b2e8361a0163c736005

    • SHA512

      18885e876690c1e61eef968ddbb954e6d597f70d11caad7f7dea268212d9f0ec30b192559e13989525977e63112634a361a71b9504524c835049ecce07ee4c42

    • SSDEEP

      12288:kpU9b5pYXaiD893Y3GliEB+VF1R89Q9Xxr/v/tF0ZS/iGDnl724MIc5JOa0EFmDj:N9b43C3laV1n7qeryMsRVWQf7QTr

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Windows security modification

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks