General

  • Target

    JaffaCakes118_b36cd4b822dbcb20f49566deccbd1e11

  • Size

    935KB

  • Sample

    250207-fz9z4a1rdp

  • MD5

    b36cd4b822dbcb20f49566deccbd1e11

  • SHA1

    37e196dd4bd86d86dadbf17f0bcbc6667913ec53

  • SHA256

    485b3329b5c2bf40e1bab2be8807d7a4188d60a46e3a70b8fd55a26242fe1178

  • SHA512

    6671e6869df42caf466dcd8beedbb7aa6d15d91ca3c972d1d10599849a1f7db572d6949e0a238060125beb4c4e13a735d2e20d32712626bbd52e9f99ffdaae09

  • SSDEEP

    12288:eEdgu2FYiQTF79G6F1t1kAAWE6g17ev8WlpCtZznOVh88UVAoQi2CMte/V5B0Z6F:e1dIV8iDVG8K4iV3V78MM7inh3kh

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

127.0.0.1:1604

192.168.1.79:1604

213.112.166.118:1604

Mutex

DC_MUTEX-7XQ1YGV

Attributes
  • gencode

    2U78e65S33pt

  • install

    false

  • offline_keylogger

    true

  • persistence

    false

Targets

    • Target

      JaffaCakes118_b36cd4b822dbcb20f49566deccbd1e11

    • Size

      935KB

    • MD5

      b36cd4b822dbcb20f49566deccbd1e11

    • SHA1

      37e196dd4bd86d86dadbf17f0bcbc6667913ec53

    • SHA256

      485b3329b5c2bf40e1bab2be8807d7a4188d60a46e3a70b8fd55a26242fe1178

    • SHA512

      6671e6869df42caf466dcd8beedbb7aa6d15d91ca3c972d1d10599849a1f7db572d6949e0a238060125beb4c4e13a735d2e20d32712626bbd52e9f99ffdaae09

    • SSDEEP

      12288:eEdgu2FYiQTF79G6F1t1kAAWE6g17ev8WlpCtZznOVh88UVAoQi2CMte/V5B0Z6F:e1dIV8iDVG8K4iV3V78MM7inh3kh

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Modifies firewall policy service

    • Modifies security service

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Windows security modification

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks