General
-
Target
JaffaCakes118_0dbb6ef7a68ce7dc9010894aed7527ce
-
Size
380KB
-
Sample
250122-pygrlaxpdm
-
MD5
0dbb6ef7a68ce7dc9010894aed7527ce
-
SHA1
66ecae1a4b3cd438c467dd629d677f7f058c8b9d
-
SHA256
a44036993ff912ae1903077a19169358e16ad522c4c63421f95b21f8cc372721
-
SHA512
73168e198ab106ffa97b93b205232fc553fefc4188c98e48a99634308ab6daa61683ac60a8f39c8f8acc3ad25c62b816dcb0e12fd4a827e0e6a97b4da07790bb
-
SSDEEP
6144:Eo09S1sX1mQZnW8YYO5AnCo7+bzay9lzKQyHnUBbNBeciYW04N9v+t9:EoAS1sFmwYYO5ACo7+bzaybzFDRBecLB
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_0dbb6ef7a68ce7dc9010894aed7527ce.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
JaffaCakes118_0dbb6ef7a68ce7dc9010894aed7527ce.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
darkcomet
Sp-52F-xd-07
xdemia.no-ip.org:1604
xdemia.no-ip.org:81
xdemia.no-ip.org:82
xdemia.no-ip.org:1705
xdemia.no-ip.org:53
MUTEX-WM97N8X
-
InstallPath
Windows\svchost.exe
-
gencode
dnSWjmFeW48u
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
svchost
Targets
-
-
Target
JaffaCakes118_0dbb6ef7a68ce7dc9010894aed7527ce
-
Size
380KB
-
MD5
0dbb6ef7a68ce7dc9010894aed7527ce
-
SHA1
66ecae1a4b3cd438c467dd629d677f7f058c8b9d
-
SHA256
a44036993ff912ae1903077a19169358e16ad522c4c63421f95b21f8cc372721
-
SHA512
73168e198ab106ffa97b93b205232fc553fefc4188c98e48a99634308ab6daa61683ac60a8f39c8f8acc3ad25c62b816dcb0e12fd4a827e0e6a97b4da07790bb
-
SSDEEP
6144:Eo09S1sX1mQZnW8YYO5AnCo7+bzay9lzKQyHnUBbNBeciYW04N9v+t9:EoAS1sFmwYYO5ACo7+bzaybzFDRBecLB
-
Darkcomet family
-
Modifies WinLogon for persistence
-
Modifies firewall policy service
-
Modifies security service
-
Windows security bypass
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Windows security modification
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
6