General
-
Target
JaffaCakes118_e6886b6361fbb6a5f0d2495eeb6e0ac7
-
Size
694KB
-
Sample
250211-p514tasjhw
-
MD5
e6886b6361fbb6a5f0d2495eeb6e0ac7
-
SHA1
de6efc38036ab5956e9a4fe979c66f56e952cd7c
-
SHA256
3307d290e7ef6c219212df9b0c53b0a347e836958e0037c26efa015493c6a1c4
-
SHA512
2f2b540acad07138370593f5ff81f0c90a670fceb0d3952acb6132139fbee0510db488c80214c7d72d343c52ed18e33dcd16e39e02952d2392c1809432aada77
-
SSDEEP
12288:8aasZ9dAKKCHw77bgskEDUsVug3Yn6RIhDo9/wAz9T4L3XSgKc3nyr:8aasZDbKCHw77bgTEDU4ugInDw/jR4rn
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_e6886b6361fbb6a5f0d2495eeb6e0ac7.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_e6886b6361fbb6a5f0d2495eeb6e0ac7.exe
Resource
win10v2004-20250207-en
Malware Config
Extracted
darkcomet
- gencode
-
install
false
-
offline_keylogger
false
-
persistence
false
Extracted
darkcomet
ID
darkserver.no-ip.info:8080
DC_MUTEX-GVZ1EFB
-
InstallPath
msdcsc.exe
-
gencode
Fl7CtJ8WQZeW
-
install
true
-
offline_keylogger
false
-
persistence
false
-
reg_key
crss
Targets
-
-
Target
JaffaCakes118_e6886b6361fbb6a5f0d2495eeb6e0ac7
-
Size
694KB
-
MD5
e6886b6361fbb6a5f0d2495eeb6e0ac7
-
SHA1
de6efc38036ab5956e9a4fe979c66f56e952cd7c
-
SHA256
3307d290e7ef6c219212df9b0c53b0a347e836958e0037c26efa015493c6a1c4
-
SHA512
2f2b540acad07138370593f5ff81f0c90a670fceb0d3952acb6132139fbee0510db488c80214c7d72d343c52ed18e33dcd16e39e02952d2392c1809432aada77
-
SSDEEP
12288:8aasZ9dAKKCHw77bgskEDUsVug3Yn6RIhDo9/wAz9T4L3XSgKc3nyr:8aasZDbKCHw77bgTEDU4ugInDw/jR4rn
-
Darkcomet family
-
Modifies WinLogon for persistence
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1