General

  • Target

    JaffaCakes118_6c9f7afb7c09c420a413b5f7f2c5cdb0

  • Size

    374KB

  • Sample

    250103-pm114awqdp

  • MD5

    6c9f7afb7c09c420a413b5f7f2c5cdb0

  • SHA1

    bc05b30655eee5f223c9f0d634ba354b8f585486

  • SHA256

    87a862ecd148181c318d98a64f0cb24ae19d1ebcabf379f0d8254181ffb2cd0b

  • SHA512

    c5cd584abd1c3ce3aea2ac52713d46bfa241ad50f1be32e8ca20aee373b7c163aee7797b4a2b53e5ae06f3647331dc95cbb382ceac1f4c9170cce3008c14113f

  • SSDEEP

    6144:HcNYS996KFifeVjBpeExgVTFSXFoMc5RhCaL37yEAvDNeqQeld94a3ovBa0:HcW7KEZlPzCy37MDN18vV

Malware Config

Extracted

Family

darkcomet

Botnet

kazantip

C2

93.116.48.67:27015

Mutex

DC_MUTEX-9FW9Z8Q

Attributes
  • InstallPath

    winlogon\winlogon.exe

  • gencode

    gpLuj6pfvQbs

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    winlogon.exe

Targets

    • Target

      JaffaCakes118_6c9f7afb7c09c420a413b5f7f2c5cdb0

    • Size

      374KB

    • MD5

      6c9f7afb7c09c420a413b5f7f2c5cdb0

    • SHA1

      bc05b30655eee5f223c9f0d634ba354b8f585486

    • SHA256

      87a862ecd148181c318d98a64f0cb24ae19d1ebcabf379f0d8254181ffb2cd0b

    • SHA512

      c5cd584abd1c3ce3aea2ac52713d46bfa241ad50f1be32e8ca20aee373b7c163aee7797b4a2b53e5ae06f3647331dc95cbb382ceac1f4c9170cce3008c14113f

    • SSDEEP

      6144:HcNYS996KFifeVjBpeExgVTFSXFoMc5RhCaL37yEAvDNeqQeld94a3ovBa0:HcW7KEZlPzCy37MDN18vV

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Modifies WinLogon for persistence

    • Modifies firewall policy service

    • Modifies security service

    • Ramnit

      Ramnit is a versatile family that holds viruses, worms, and Trojans.

    • Ramnit family

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks