General

  • Target

    JaffaCakes118_07aac523473ca66487a6e29cb3a8dfd1

  • Size

    249KB

  • Sample

    250121-1f183a1res

  • MD5

    07aac523473ca66487a6e29cb3a8dfd1

  • SHA1

    f1c313bbba97d97cbcfc496b170ca112a9f08da1

  • SHA256

    13e7709b9c2f4754efb6e8a956cf810297b64bbd29959b8fa3d1adcca3c18590

  • SHA512

    5f1a630aaf54faad5db8883622b652ba3b7cd0c84507543dd8858ae00616f764522a927a05c66e8fdf13f7b0b6b6b929a047a4573b21cf0ba2dea51fabc5e1f0

  • SSDEEP

    6144:swT5O7pJmNB6dLY6dCnnsyZLHoaIyv6ocU/qxDS2xDWb3cw0O:sP+NULZdCn3TbncU2D7Ab3m

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

rawrmonster.no-ip.info:4384

Mutex

DC_MUTEX-XYTRZX8

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    PS5SanKTncZj

  • install

    true

  • offline_keylogger

    true

  • password

    $@ndy@4384

  • persistence

    false

  • reg_key

    MicroUpdate

Targets

    • Target

      JaffaCakes118_07aac523473ca66487a6e29cb3a8dfd1

    • Size

      249KB

    • MD5

      07aac523473ca66487a6e29cb3a8dfd1

    • SHA1

      f1c313bbba97d97cbcfc496b170ca112a9f08da1

    • SHA256

      13e7709b9c2f4754efb6e8a956cf810297b64bbd29959b8fa3d1adcca3c18590

    • SHA512

      5f1a630aaf54faad5db8883622b652ba3b7cd0c84507543dd8858ae00616f764522a927a05c66e8fdf13f7b0b6b6b929a047a4573b21cf0ba2dea51fabc5e1f0

    • SSDEEP

      6144:swT5O7pJmNB6dLY6dCnnsyZLHoaIyv6ocU/qxDS2xDWb3cw0O:sP+NULZdCn3TbncU2D7Ab3m

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Modifies WinLogon for persistence

    • Modifies firewall policy service

    • Modifies security service

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks