General

  • Target

    JaffaCakes118_0b7d5bfc592ba2082abd593fd53e2b58

  • Size

    681KB

  • Sample

    250122-h4y5havpbk

  • MD5

    0b7d5bfc592ba2082abd593fd53e2b58

  • SHA1

    e47a13cdd1b462efc68d2a68e8413c61d382d635

  • SHA256

    b2d4c2b337d19df6b8c556285ce9ad59f2a5beb8d7993d8e731a48f20dcaa752

  • SHA512

    568dc8e3e56ba07cb752aa513acddb3fbb2a183222b92d25af106acd63068a51156bdf360359ca1a730e50a5a81922f0d373f5ea671e073e5ce396ea552a069f

  • SSDEEP

    12288:Qk0QNlxOnizg37k4LUSd0rv5WvYW5HMzLXj9pqQd7cqESAYi991fA/aVRZ:J0QpGih4bd0rv5+l5szLXj917cqPu91b

Malware Config

Extracted

Family

darkcomet

Botnet

Zombie

C2

anonymous-hr.zapto.org:5150

127.0.0.1:5150

Mutex

DC_MUTEX-GND5LQ6

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    fvkBdq5YuSX7

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    MicroUpdate

Targets

    • Target

      JaffaCakes118_0b7d5bfc592ba2082abd593fd53e2b58

    • Size

      681KB

    • MD5

      0b7d5bfc592ba2082abd593fd53e2b58

    • SHA1

      e47a13cdd1b462efc68d2a68e8413c61d382d635

    • SHA256

      b2d4c2b337d19df6b8c556285ce9ad59f2a5beb8d7993d8e731a48f20dcaa752

    • SHA512

      568dc8e3e56ba07cb752aa513acddb3fbb2a183222b92d25af106acd63068a51156bdf360359ca1a730e50a5a81922f0d373f5ea671e073e5ce396ea552a069f

    • SSDEEP

      12288:Qk0QNlxOnizg37k4LUSd0rv5WvYW5HMzLXj9pqQd7cqESAYi991fA/aVRZ:J0QpGih4bd0rv5+l5szLXj917cqPu91b

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Modifies WinLogon for persistence

    • Modifies security service

    • Windows security bypass

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks