General
-
Target
JaffaCakes118_bad08d05cda85012139b65ae76b480d9
-
Size
541KB
-
Sample
250207-yj7txawlhp
-
MD5
bad08d05cda85012139b65ae76b480d9
-
SHA1
8afc8334c4ab0622e7dd7d5b6d5f5fccd6d098e9
-
SHA256
16a3594451a28ecd761dac457bd0c69e64da7cc757c7738a20f8b038f81884fc
-
SHA512
d264ff0797f883f15dd9fe6da0a2e4ca9ba561aa6d4cc5c1bc9d87de44b972e80b73976221555b1eb5eefbf1ac218c42d30e578df480655366a61a3ecfabfd88
-
SSDEEP
12288:XMmiZtBK5o8aJOveyr5hP5N7iwRMbnWdnI:XTizB0R2KP5N7iwR39I
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_bad08d05cda85012139b65ae76b480d9.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
JaffaCakes118_bad08d05cda85012139b65ae76b480d9.exe
Resource
win10v2004-20250207-en
Malware Config
Extracted
darkcomet
Guest16
tf25.zapto.org:1604
DC_MUTEX-GWP842Q
-
gencode
z/vWloEgu2ap
-
install
false
-
offline_keylogger
true
-
password
dropplace
-
persistence
false
Extracted
darkcomet
- gencode
-
install
false
-
offline_keylogger
false
-
persistence
false
Targets
-
-
Target
JaffaCakes118_bad08d05cda85012139b65ae76b480d9
-
Size
541KB
-
MD5
bad08d05cda85012139b65ae76b480d9
-
SHA1
8afc8334c4ab0622e7dd7d5b6d5f5fccd6d098e9
-
SHA256
16a3594451a28ecd761dac457bd0c69e64da7cc757c7738a20f8b038f81884fc
-
SHA512
d264ff0797f883f15dd9fe6da0a2e4ca9ba561aa6d4cc5c1bc9d87de44b972e80b73976221555b1eb5eefbf1ac218c42d30e578df480655366a61a3ecfabfd88
-
SSDEEP
12288:XMmiZtBK5o8aJOveyr5hP5N7iwRMbnWdnI:XTizB0R2KP5N7iwR39I
-
Darkcomet family
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1