General

  • Target

    JaffaCakes118_2f282f2f5db406a975515e760c737064

  • Size

    977KB

  • Sample

    250125-yq9xvaznaj

  • MD5

    2f282f2f5db406a975515e760c737064

  • SHA1

    086606745368b08cadcc8c52637e6671bcd78143

  • SHA256

    28f1985d46fc6d99f608c31cfac9e58ed791ba5c8e6f4750b2e95604c03d68ac

  • SHA512

    12081546ebf2015547c48f7ed9fa791b2051f1e3aa428e92a3a2e0bef34e310c9bdbe57550e682f4da71466f7678cc7c303c1586cd28245819ff5270b1d1430c

  • SSDEEP

    24576:9Z1xuVVjfFoynPaVBUR8f+kN10EBdW9Q6PBLqt:HQDgok30iW9ve

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

myuser32.myftp.biz:1604

Mutex

DC_MUTEX-3Z5YND5

Attributes
  • InstallPath

    System32\SysConf.exe

  • gencode

    Tg91GaNcEBpG

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    SystemConf

Targets

    • Target

      JaffaCakes118_2f282f2f5db406a975515e760c737064

    • Size

      977KB

    • MD5

      2f282f2f5db406a975515e760c737064

    • SHA1

      086606745368b08cadcc8c52637e6671bcd78143

    • SHA256

      28f1985d46fc6d99f608c31cfac9e58ed791ba5c8e6f4750b2e95604c03d68ac

    • SHA512

      12081546ebf2015547c48f7ed9fa791b2051f1e3aa428e92a3a2e0bef34e310c9bdbe57550e682f4da71466f7678cc7c303c1586cd28245819ff5270b1d1430c

    • SSDEEP

      24576:9Z1xuVVjfFoynPaVBUR8f+kN10EBdW9Q6PBLqt:HQDgok30iW9ve

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Modifies WinLogon for persistence

    • Modifies firewall policy service

    • Modifies security service

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks