General

  • Target

    JaffaCakes118_ea02b64872bf57075eb19b3a7c14721c

  • Size

    1.3MB

  • Sample

    250211-y8l9hayqhj

  • MD5

    ea02b64872bf57075eb19b3a7c14721c

  • SHA1

    65829f2c82b58610aa4d12b6459b52fadd27c9bc

  • SHA256

    539cdcf76a95338f348555fe6809820cc3d63b97f01cff1525d16825cbfa37d2

  • SHA512

    1dbd7174585d78de5bfd2c4767d430a9ecd940bd624478c9c4a207010b93ea0ebd97b88f64d35739be0e22582c8b22709b24651cc14311bcb76bb1c5c7e9e47e

  • SSDEEP

    24576:+thEVaPqLDI0VX4SM6cHzvZlU6QXdaMiPNDUvhe:GEVUcDz4S8H7ZlVOaTPNDUc

Malware Config

Extracted

Family

darkcomet

Attributes
  • gencode

  • install

    false

  • offline_keylogger

    false

  • persistence

    false

rc4.plain

Extracted

Family

darkcomet

Botnet

Guest16

C2

uoku.sytes.net:1604

Mutex

DC_MUTEX-6RX1XUR

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    JmfA2%zA1X/y

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

rc4.plain

Targets

    • Target

      JaffaCakes118_ea02b64872bf57075eb19b3a7c14721c

    • Size

      1.3MB

    • MD5

      ea02b64872bf57075eb19b3a7c14721c

    • SHA1

      65829f2c82b58610aa4d12b6459b52fadd27c9bc

    • SHA256

      539cdcf76a95338f348555fe6809820cc3d63b97f01cff1525d16825cbfa37d2

    • SHA512

      1dbd7174585d78de5bfd2c4767d430a9ecd940bd624478c9c4a207010b93ea0ebd97b88f64d35739be0e22582c8b22709b24651cc14311bcb76bb1c5c7e9e47e

    • SSDEEP

      24576:+thEVaPqLDI0VX4SM6cHzvZlU6QXdaMiPNDUvhe:GEVUcDz4S8H7ZlVOaTPNDUc

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Modifies WinLogon for persistence

    • Modifies firewall policy service

    • Disables RegEdit via registry modification

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks