General
-
Target
JaffaCakes118_0ba7b8d965c537a055fd71d37b1390e6
-
Size
232KB
-
Sample
250122-jlgceawmhq
-
MD5
0ba7b8d965c537a055fd71d37b1390e6
-
SHA1
f0a0f1aff95c08cce9dac2aef1d5a89611c66b27
-
SHA256
c43434a415763a328dbebcb7f0c27cfe5972a216728b4eacdaa1f35f06f568ba
-
SHA512
da8c2a9404066b33c52381bbc2277c1c27a7be346053360552a1a04893f7e3d18d0bb859931c9374c076d819a1f259b941313b03863c7aa671924537dfbc649b
-
SSDEEP
6144:GjFy93LU92VxOtVflFud4TnxcpPTASCmqMorHwMb+oS:mFy9bPQZlFjrG0ZmYbwg+oS
Behavioral task
behavioral1
Sample
JaffaCakes118_0ba7b8d965c537a055fd71d37b1390e6.exe
Resource
win7-20241010-en
Malware Config
Extracted
darkcomet
Slave
68.53.85.102 :1604
DCMIN_MUTEX-025M0EV
-
InstallPath
DCSCMIN\IMDCSC.exe
-
gencode
PcXH8XKE2wN4
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
nets
Targets
-
-
Target
JaffaCakes118_0ba7b8d965c537a055fd71d37b1390e6
-
Size
232KB
-
MD5
0ba7b8d965c537a055fd71d37b1390e6
-
SHA1
f0a0f1aff95c08cce9dac2aef1d5a89611c66b27
-
SHA256
c43434a415763a328dbebcb7f0c27cfe5972a216728b4eacdaa1f35f06f568ba
-
SHA512
da8c2a9404066b33c52381bbc2277c1c27a7be346053360552a1a04893f7e3d18d0bb859931c9374c076d819a1f259b941313b03863c7aa671924537dfbc649b
-
SSDEEP
6144:GjFy93LU92VxOtVflFud4TnxcpPTASCmqMorHwMb+oS:mFy9bPQZlFjrG0ZmYbwg+oS
-
Darkcomet family
-
Modifies WinLogon for persistence
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1