General

  • Target

    JaffaCakes118_78069076264a46ef6a3d66d3d9b4ed50

  • Size

    1.3MB

  • Sample

    250104-gmgnfsvrg1

  • MD5

    78069076264a46ef6a3d66d3d9b4ed50

  • SHA1

    e3871d684469810c1b93f05d2f16324cd817f55d

  • SHA256

    0da14f1383ac0644279c0bf1d3651c69e3ef0cefbb4f343edff14537c0d8effe

  • SHA512

    1fcb2565505f903854106bf562211cce2ef480c60c2bf21211e1a82bd8aea1bdb0031036d7119907354e9cc464a4221bc258d1bfb6192fa2fe4649007d9ab632

  • SSDEEP

    24576:TYSj0spI7nYSj0spI7RYSj0spI7rYSj0spI7+qP9YsQnYoJU0oFGc:TYSY1nYSY1RYSY1rYSY1+89FOTSx

Malware Config

Extracted

Family

darkcomet

Botnet

Nubão

C2

prodigiohk.no-ip.org:6666

Mutex

Avast_Security-6PM6DD0

Attributes
  • InstallPath

    Drivers\msdcsc.exe

  • gencode

    Pnl2rf9hilzY

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    Monitor Driver

Extracted

Family

darkcomet

Attributes
  • gencode

  • install

    false

  • offline_keylogger

    false

  • persistence

    false

Targets

    • Target

      JaffaCakes118_78069076264a46ef6a3d66d3d9b4ed50

    • Size

      1.3MB

    • MD5

      78069076264a46ef6a3d66d3d9b4ed50

    • SHA1

      e3871d684469810c1b93f05d2f16324cd817f55d

    • SHA256

      0da14f1383ac0644279c0bf1d3651c69e3ef0cefbb4f343edff14537c0d8effe

    • SHA512

      1fcb2565505f903854106bf562211cce2ef480c60c2bf21211e1a82bd8aea1bdb0031036d7119907354e9cc464a4221bc258d1bfb6192fa2fe4649007d9ab632

    • SSDEEP

      24576:TYSj0spI7nYSj0spI7RYSj0spI7rYSj0spI7+qP9YsQnYoJU0oFGc:TYSY1nYSY1RYSY1rYSY1+89FOTSx

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Modifies WinLogon for persistence

    • Modifies firewall policy service

    • Modifies security service

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks