General

  • Target

    JaffaCakes118_03b794dd5a1f48698efaba82986e0c24

  • Size

    2.5MB

  • Sample

    250121-lwfvqsyjgn

  • MD5

    03b794dd5a1f48698efaba82986e0c24

  • SHA1

    8abe8064f81f8bcd7d04b19dc59bb98333908ce6

  • SHA256

    35b1fc1278b92658c6e6af725253aaf7a060f69fdc58e3a2a696ca9fbc799c81

  • SHA512

    36e6956e5a5b92af08658c1770f3da017b63bc630e5533016d67d09abd7870a01033b12d2aa31b0b727ba1e268fe80bf1f35f9152cf2bd058628e379a37cffd7

  • SSDEEP

    49152:S/SJ5InRTIKCzHuLLiNUlNeHmFpAh+CJdZbSoIfKN5lH9aDHD89t:sSJXZHmOmokpEvJpoI7H9aDj8

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

cucu.no-ip.org:1500

Mutex

DC_MUTEX-23UB63C

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    naPTMgVpHACh

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    MicroUpdate

Targets

    • Target

      JaffaCakes118_03b794dd5a1f48698efaba82986e0c24

    • Size

      2.5MB

    • MD5

      03b794dd5a1f48698efaba82986e0c24

    • SHA1

      8abe8064f81f8bcd7d04b19dc59bb98333908ce6

    • SHA256

      35b1fc1278b92658c6e6af725253aaf7a060f69fdc58e3a2a696ca9fbc799c81

    • SHA512

      36e6956e5a5b92af08658c1770f3da017b63bc630e5533016d67d09abd7870a01033b12d2aa31b0b727ba1e268fe80bf1f35f9152cf2bd058628e379a37cffd7

    • SSDEEP

      49152:S/SJ5InRTIKCzHuLLiNUlNeHmFpAh+CJdZbSoIfKN5lH9aDHD89t:sSJXZHmOmokpEvJpoI7H9aDj8

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Modifies WinLogon for persistence

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks