General

  • Target

    JaffaCakes118_bd468b0f3db58b23c362ad549a4dc896

  • Size

    746KB

  • Sample

    250208-bajdmawra1

  • MD5

    bd468b0f3db58b23c362ad549a4dc896

  • SHA1

    879f3adb3a8ebe18257294305adc7b562944c7c0

  • SHA256

    79130903a33761ddf302398d93a7162454afc1d93608f1925fd483675516baf4

  • SHA512

    236b22871ab79cfb551ca36b31a0260b4096dcaae9373007e73b3c6317fae42786ada5401bb9786e6b1088cdf156137b567448a1aa288c7e5924cfab4e3689d0

  • SSDEEP

    12288:0aAchpWsuVTv7ItY8XljyypHP7cOLBev03hlULsmWZ++09ZcKDVsgdJ:FAEENIq8XwyVPQclDq/+WnpsS

Malware Config

Extracted

Family

darkcomet

Botnet

EMP - 1

C2

empa7hy.no-ip.org:82

Mutex

DC_MUTEX-860UXEX

Attributes
  • InstallPath

    Windupdt\winupdate.exe

  • gencode

    t=x=714vip+P

  • install

    true

  • offline_keylogger

    false

  • persistence

    false

  • reg_key

    winupdater

rc4.plain

Targets

    • Target

      JaffaCakes118_bd468b0f3db58b23c362ad549a4dc896

    • Size

      746KB

    • MD5

      bd468b0f3db58b23c362ad549a4dc896

    • SHA1

      879f3adb3a8ebe18257294305adc7b562944c7c0

    • SHA256

      79130903a33761ddf302398d93a7162454afc1d93608f1925fd483675516baf4

    • SHA512

      236b22871ab79cfb551ca36b31a0260b4096dcaae9373007e73b3c6317fae42786ada5401bb9786e6b1088cdf156137b567448a1aa288c7e5924cfab4e3689d0

    • SSDEEP

      12288:0aAchpWsuVTv7ItY8XljyypHP7cOLBev03hlULsmWZ++09ZcKDVsgdJ:FAEENIq8XwyVPQclDq/+WnpsS

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Modifies WinLogon for persistence

    • Modifies firewall policy service

    • Modifies security service

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Downloads MZ/PE file

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks