General

  • Target

    JaffaCakes118_6ee5e5fa6edc14543aaa4042e157c16b

  • Size

    5.6MB

  • Sample

    250103-xvvhaa1pfk

  • MD5

    6ee5e5fa6edc14543aaa4042e157c16b

  • SHA1

    a127e133ba348a900b8fe03c6559caaf44f5cc0d

  • SHA256

    f30327b72bed055f5db63a2f91399bdc58f604ef6783f0ac63ae1255cdbe4a78

  • SHA512

    b7a5e223a0becfa468e2c1a4b8c22d2d11ebd241e4d498994d60e143c776f9d3bfdf8b734453e21ebec7cbffac77c2f4d35e85fa37b20af692aba15f8829c01f

  • SSDEEP

    98304:tGT1UbpwmSMM8WqZxi6bvXhHNPcN9RcbqL84MqvozfXzw0N:tGVoNLXhHFIPYqw/qvozfXzw0N

Malware Config

Extracted

Family

darkcomet

Botnet

Vectim

C2

leader.no-ip.org:1604

hiden-3.no-ip.org:1604

Mutex

DC_MUTEX-2HP4MZW

Attributes
  • InstallPath

    AppData\explorer.exe

  • gencode

    xjjHUPgowC9o

  • install

    true

  • offline_keylogger

    true

  • password

    987654321

  • persistence

    true

  • reg_key

    MicroUpdate

Targets

    • Target

      JaffaCakes118_6ee5e5fa6edc14543aaa4042e157c16b

    • Size

      5.6MB

    • MD5

      6ee5e5fa6edc14543aaa4042e157c16b

    • SHA1

      a127e133ba348a900b8fe03c6559caaf44f5cc0d

    • SHA256

      f30327b72bed055f5db63a2f91399bdc58f604ef6783f0ac63ae1255cdbe4a78

    • SHA512

      b7a5e223a0becfa468e2c1a4b8c22d2d11ebd241e4d498994d60e143c776f9d3bfdf8b734453e21ebec7cbffac77c2f4d35e85fa37b20af692aba15f8829c01f

    • SSDEEP

      98304:tGT1UbpwmSMM8WqZxi6bvXhHNPcN9RcbqL84MqvozfXzw0N:tGVoNLXhHFIPYqw/qvozfXzw0N

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Modifies WinLogon for persistence

    • Modifies firewall policy service

    • Modifies security service

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks