General

  • Target

    JaffaCakes118_6b6a94ac17d74979c41f9df5dd987740

  • Size

    779KB

  • Sample

    250103-khzj9aynfj

  • MD5

    6b6a94ac17d74979c41f9df5dd987740

  • SHA1

    f51f2ad7cb34073d5ef5fc900368369202331506

  • SHA256

    0a1da724132eca214511cff376c2ba53ae7fa63b96d6f60a3f51a205caf43e90

  • SHA512

    0e0329f21bd82ac2d7dd6dd67b9a5c49b09a92d2294b506176454d80420447a2746f2240353c64e16ce6714afbec9a5df5ccb87011dc0a39f76984282b31d69d

  • SSDEEP

    12288:h4YJH6lgnTSwfC55c7nnoUIRk1WtEupY5saNLlSsl5HOYdyYLI:h4+H6lpwfC56DOq0tEupSB6Cf0

Malware Config

Extracted

Family

darkcomet

Botnet

HaCkEd

C2

imasoldier.zapto.org:1065

Mutex

DC_MUTEX-F4Y6Y3U

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    NvNoWDafnVkg

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

Targets

    • Target

      JaffaCakes118_6b6a94ac17d74979c41f9df5dd987740

    • Size

      779KB

    • MD5

      6b6a94ac17d74979c41f9df5dd987740

    • SHA1

      f51f2ad7cb34073d5ef5fc900368369202331506

    • SHA256

      0a1da724132eca214511cff376c2ba53ae7fa63b96d6f60a3f51a205caf43e90

    • SHA512

      0e0329f21bd82ac2d7dd6dd67b9a5c49b09a92d2294b506176454d80420447a2746f2240353c64e16ce6714afbec9a5df5ccb87011dc0a39f76984282b31d69d

    • SSDEEP

      12288:h4YJH6lgnTSwfC55c7nnoUIRk1WtEupY5saNLlSsl5HOYdyYLI:h4+H6lpwfC56DOq0tEupSB6Cf0

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Modifies WinLogon for persistence

    • Modifies security service

    • Windows security bypass

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks