General
-
Target
JaffaCakes118_0262abba1495fdf3690f53ed698305ba
-
Size
922KB
-
Sample
250121-gcv34ayngl
-
MD5
0262abba1495fdf3690f53ed698305ba
-
SHA1
bcff871d71b17aa5201e139fa1d1740ad73e62ee
-
SHA256
7c732559761e1114e81bd9e83a10043aa902ab8fbec37b230ffc315230f8fac9
-
SHA512
044b1025e47d783028d59608959935ccff6878760532bc2979269dff5e8a55ae7771d5cd53da7fb32a079e64d6e27537b92306d5f4b3a94cc925e1b654a7e561
-
SSDEEP
24576:qdsB7NHKYiZrIXn4Xx5+4sQuTfpy1BGZ3s:uxA4Q7peBU3
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_0262abba1495fdf3690f53ed698305ba.exe
Resource
win7-20240903-en
Malware Config
Extracted
darkcomet
RAT's
pritt48.no-ip.biz:1604
DCMIN_MUTEX-TP2KJJ1
-
gencode
MXA1Di9pJZKF
-
install
false
-
offline_keylogger
true
-
persistence
false
Targets
-
-
Target
JaffaCakes118_0262abba1495fdf3690f53ed698305ba
-
Size
922KB
-
MD5
0262abba1495fdf3690f53ed698305ba
-
SHA1
bcff871d71b17aa5201e139fa1d1740ad73e62ee
-
SHA256
7c732559761e1114e81bd9e83a10043aa902ab8fbec37b230ffc315230f8fac9
-
SHA512
044b1025e47d783028d59608959935ccff6878760532bc2979269dff5e8a55ae7771d5cd53da7fb32a079e64d6e27537b92306d5f4b3a94cc925e1b654a7e561
-
SSDEEP
24576:qdsB7NHKYiZrIXn4Xx5+4sQuTfpy1BGZ3s:uxA4Q7peBU3
-
Darkcomet family
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-