General

  • Target

    JaffaCakes118_5c7bcd08091c8bdd42f289967fa4f364

  • Size

    1.1MB

  • Sample

    250129-3nreya1pbq

  • MD5

    5c7bcd08091c8bdd42f289967fa4f364

  • SHA1

    4ee9545b874b21cbde906fda3d233e7d4af8b300

  • SHA256

    57fd41c4cf91214e1d1bd6c7ab784072f03b0253ceb493b9976d34e03220fd0c

  • SHA512

    40224376a8810a2ed13eea3179b181d08544e94a7aef83a075c06c0997078c201f6b4bd9502074a9eb14431b1da1649ddac15a98309333f596baaded3b1fa86b

  • SSDEEP

    24576:PCh6a/FoVKghO6EtOSCjonOmuZRe1Lhht0Arm5ZVbt:PCh5toVKfA6MSn0ArmTVx

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

sabahhassan.no-ip.biz:1604

Mutex

DC_MUTEX-MHPA3BK

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    MAYkZ7Pow4iS

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

Targets

    • Target

      JaffaCakes118_5c7bcd08091c8bdd42f289967fa4f364

    • Size

      1.1MB

    • MD5

      5c7bcd08091c8bdd42f289967fa4f364

    • SHA1

      4ee9545b874b21cbde906fda3d233e7d4af8b300

    • SHA256

      57fd41c4cf91214e1d1bd6c7ab784072f03b0253ceb493b9976d34e03220fd0c

    • SHA512

      40224376a8810a2ed13eea3179b181d08544e94a7aef83a075c06c0997078c201f6b4bd9502074a9eb14431b1da1649ddac15a98309333f596baaded3b1fa86b

    • SSDEEP

      24576:PCh6a/FoVKghO6EtOSCjonOmuZRe1Lhht0Arm5ZVbt:PCh5toVKfA6MSn0ArmTVx

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Modifies WinLogon for persistence

    • Modifies firewall policy service

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Downloads MZ/PE file

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Program crash

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks