General

  • Target

    JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07

  • Size

    854KB

  • Sample

    250207-3gzsqsvkcj

  • MD5

    bc9a5b89f91f37a2d2a605c98745eb07

  • SHA1

    7f6894fad9ab377dca25e44607ea23451384e7b0

  • SHA256

    a3a8bf9a082e1825db80e7df1e6aebf289328cd4bcbd719f8d6da6b9686a6883

  • SHA512

    232c9f81e90aa6ceac059391056160520229af60a703a2fa830e524645fa09d14fc632d8916adfa352f3209f5a7a70a7a05f8f1d12e3bfe01061d3f4877a4c55

  • SSDEEP

    12288:lrrPfHyTJIoVzp5B+C35gTqqzXcJYN45iqLSnX+vIdBd1NXvrqvtg0O9B4M9DJ:l/4WgwoC/sJo45iq+yIZ1NfeVg0gBl

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

kaank11.zapto.org:15963

Mutex

DC_MUTEX-B22UUWY

Attributes
  • InstallPath

    Windupdt\JavaSun.exe

  • gencode

    x-tEbBWdArpJ

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    JavaSun

rc4.plain

Extracted

Family

darkcomet

Attributes
  • gencode

  • install

    false

  • offline_keylogger

    false

  • persistence

    false

rc4.plain

Targets

    • Target

      JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07

    • Size

      854KB

    • MD5

      bc9a5b89f91f37a2d2a605c98745eb07

    • SHA1

      7f6894fad9ab377dca25e44607ea23451384e7b0

    • SHA256

      a3a8bf9a082e1825db80e7df1e6aebf289328cd4bcbd719f8d6da6b9686a6883

    • SHA512

      232c9f81e90aa6ceac059391056160520229af60a703a2fa830e524645fa09d14fc632d8916adfa352f3209f5a7a70a7a05f8f1d12e3bfe01061d3f4877a4c55

    • SSDEEP

      12288:lrrPfHyTJIoVzp5B+C35gTqqzXcJYN45iqLSnX+vIdBd1NXvrqvtg0O9B4M9DJ:l/4WgwoC/sJo45iq+yIZ1NfeVg0gBl

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Modifies WinLogon for persistence

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks