General

  • Target

    JaffaCakes118_07c23df001df7e506492963e3da1f05d

  • Size

    1.4MB

  • Sample

    250121-1qestatjbp

  • MD5

    07c23df001df7e506492963e3da1f05d

  • SHA1

    cfc0f3f9ae3573338eab8a6c21fc03d0e5ccf072

  • SHA256

    82521bc29ba647a7ce9b04dd2ddfd8e5a4e6aea8f1cea324d5061725e620e9a1

  • SHA512

    17e05336fc8f51713830f0012a9a008b94c2e4296ee9f31ac9d3e543fbbef1ae23097ffbe35f04c9414b2592352e3e61ebd7a3c316692d6ba1dddcd6aed6ffe2

  • SSDEEP

    24576:Ug25Nb0iuknMq8iDthEVaPqLnu+ws7GkyIpf1xlC1EKErHZH4NmXlRLuS63ZyKnT:dJjMXEVUcuMqOf17C1EPrHZXLQpGaN

Malware Config

Targets

    • Target

      JaffaCakes118_07c23df001df7e506492963e3da1f05d

    • Size

      1.4MB

    • MD5

      07c23df001df7e506492963e3da1f05d

    • SHA1

      cfc0f3f9ae3573338eab8a6c21fc03d0e5ccf072

    • SHA256

      82521bc29ba647a7ce9b04dd2ddfd8e5a4e6aea8f1cea324d5061725e620e9a1

    • SHA512

      17e05336fc8f51713830f0012a9a008b94c2e4296ee9f31ac9d3e543fbbef1ae23097ffbe35f04c9414b2592352e3e61ebd7a3c316692d6ba1dddcd6aed6ffe2

    • SSDEEP

      24576:Ug25Nb0iuknMq8iDthEVaPqLnu+ws7GkyIpf1xlC1EKErHZH4NmXlRLuS63ZyKnT:dJjMXEVUcuMqOf17C1EPrHZXLQpGaN

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Modifies WinLogon for persistence

    • Windows security bypass

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks