General

  • Target

    JaffaCakes118_ca774575a2253b0aa51d7294cc45e5b7

  • Size

    1.8MB

  • Sample

    250109-rq17dasjcz

  • MD5

    ca774575a2253b0aa51d7294cc45e5b7

  • SHA1

    150df3f0e8e861f802157084bc64a8ec8b34fa42

  • SHA256

    62db18b1b1d4ac66d198ecfbc1195dc13373fd29833c58bf71cfa4255679c578

  • SHA512

    8fd26c938e24f67c1f25e22bc59b73ffcf44ecdf6454eddf42d7ccb19fa132533b5d8ac2a2aea43c298e9c1858d769a5c9b514db71441daacec32a35c4573b07

  • SSDEEP

    49152:3IYjlLwtsGun9LIo3BBdLbrfTVzvjYK1nmD6:YYj9wtsGuLf/v8K1nmD6

Malware Config

Extracted

Family

darkcomet

Botnet

2021New-Sept-1

C2

45.74.4.244:35888

Mutex

DC_MUTEX-7DDJ5ZC

Attributes
  • InstallPath

    wirar.exe

  • gencode

    cYaHnoJ4tARs

  • install

    true

  • offline_keylogger

    true

  • password

    hhhhhh

  • persistence

    false

  • reg_key

    rar

Extracted

Family

warzonerat

C2

45.74.4.244:5205

Targets

    • Target

      JaffaCakes118_ca774575a2253b0aa51d7294cc45e5b7

    • Size

      1.8MB

    • MD5

      ca774575a2253b0aa51d7294cc45e5b7

    • SHA1

      150df3f0e8e861f802157084bc64a8ec8b34fa42

    • SHA256

      62db18b1b1d4ac66d198ecfbc1195dc13373fd29833c58bf71cfa4255679c578

    • SHA512

      8fd26c938e24f67c1f25e22bc59b73ffcf44ecdf6454eddf42d7ccb19fa132533b5d8ac2a2aea43c298e9c1858d769a5c9b514db71441daacec32a35c4573b07

    • SSDEEP

      49152:3IYjlLwtsGun9LIo3BBdLbrfTVzvjYK1nmD6:YYj9wtsGuLf/v8K1nmD6

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Modifies WinLogon for persistence

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzonerat family

    • Warzone RAT payload

    • Disables Task Manager via registry modification

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks