General
-
Target
JaffaCakes118_6d818dc8eac5696f3169d335aa12db90
-
Size
756KB
-
Sample
250103-shjg2azmgx
-
MD5
6d818dc8eac5696f3169d335aa12db90
-
SHA1
add3b0edfc541372fbf4181ea78483de04c21c7d
-
SHA256
3e2b70491923a6e129272cb9a61a16034c9775ef0c4602a06737dd4035f19df3
-
SHA512
acecbf393b2029985a166ed938230f201ff33b01f35e01af42762289d1651d91b12d63f63c92b1315ec81eac5a91c007d32a3d81b9e18efbb181e4540caf42ff
-
SSDEEP
12288:o9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/hiGC:cZ1xuVVjfFoynPaVBUR8f+kN10EBJC
Behavioral task
behavioral1
Sample
JaffaCakes118_6d818dc8eac5696f3169d335aa12db90.exe
Resource
win7-20240903-en
Malware Config
Extracted
darkcomet
newHack
hackerproff.no-ip.biz:1604
DC_MUTEX-AEEZXYW
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
kFnezybML1Fw
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
MicroUpdate
Targets
-
-
Target
JaffaCakes118_6d818dc8eac5696f3169d335aa12db90
-
Size
756KB
-
MD5
6d818dc8eac5696f3169d335aa12db90
-
SHA1
add3b0edfc541372fbf4181ea78483de04c21c7d
-
SHA256
3e2b70491923a6e129272cb9a61a16034c9775ef0c4602a06737dd4035f19df3
-
SHA512
acecbf393b2029985a166ed938230f201ff33b01f35e01af42762289d1651d91b12d63f63c92b1315ec81eac5a91c007d32a3d81b9e18efbb181e4540caf42ff
-
SSDEEP
12288:o9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/hiGC:cZ1xuVVjfFoynPaVBUR8f+kN10EBJC
-
Darkcomet family
-
Modifies WinLogon for persistence
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify Tools
2Modify Registry
4