General
-
Target
JaffaCakes118_780b6a602e2f2ae248a99839708e9850
-
Size
637KB
-
Sample
250104-gpqzxawjhy
-
MD5
780b6a602e2f2ae248a99839708e9850
-
SHA1
e30854c4499d4e4072df90baf31c92d60576ec6c
-
SHA256
bd66794fc5f240473bc307053fcb8bb547fe900591c71ebf35d8e80e6d56042c
-
SHA512
5707fe9a1f95113aac54d9e9d9505cffec0fcad252b17b1dee5b3e57de59e5a7171c2566fc5d86d76fdd2050a22725d7cc019e961315a064588185e8e9e036ad
-
SSDEEP
12288:DXcwNT1q5AXo9BoiFrUtos+55ejmqEzaPUsVf33Zas+AGgWiPXvNWJ2qiqp6Uh8D:bcOIX6toH52Q8RaNAGgWivvNWJ9iqth6
Static task
static1
Behavioral task
behavioral1
Sample
Mtgox-Code.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Mtgox-Code.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
darkcomet
Guest16_min
lakaisucksbigcawks.no-ip.biz:3940
DCMIN_MUTEX-Z56GG71
-
InstallPath
DCSCMIN\IMDCSC.exe
-
gencode
1zWRnrU8ybNP
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
DarkComet RAT
Targets
-
-
Target
Mtgox-Code.com
-
Size
661KB
-
MD5
3f1f75ca7d74031e8bbe925ea13bf649
-
SHA1
d5a678dd4228344cb7731ee1bd801e91482b3bcc
-
SHA256
89dba6832997b562206c404764c9644d6a5df70429a02c1ee809b081549efeda
-
SHA512
67ade3dc6926d09e5126c2348daa70d651c84b69c41135506ebc5e723fa96887b3983ca457dc5642b95e966f860bd3a91b9e63360073d429fc2a1fe080869f9a
-
SSDEEP
12288:O/cwfT1qnAXoDBoiFtUt4sgj5eXmqE5aBUsVVP3Nas+AGgaiPXvNsJ2qiqt6UOz8:acqchIt4F5U28naNAGgaivvNsJ9iqBIo
-
Darkcomet family
-
Modifies WinLogon for persistence
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-