General

  • Target

    JaffaCakes118_e9caf32e33bb954fff2c3fadb1e04a8d

  • Size

    1.3MB

  • Sample

    250211-yn9jasypet

  • MD5

    e9caf32e33bb954fff2c3fadb1e04a8d

  • SHA1

    7944adf221b1439bae9338332a270400c03bb77a

  • SHA256

    a84f921834aef064417f4e391e1e29d34b4d0bc04989e9cbbbd64318f8708e91

  • SHA512

    a3308bdcf72d6fc40df8fbe34c0a52da3c16fa228d10a8aa03941333a1015aa17b27c96808dbcdd47ee1d817a1b2f51777f2c2f9b230d8b2a317d7bcfde01412

  • SSDEEP

    24576:y4ktSIvTfZbkXWr+ypPiq1hCnCSyWhrtNSNXjJH4AUgMGs:8YkxQmKyplLS3RtNQCAD2

Malware Config

Extracted

Family

darkcomet

Botnet

test

C2

romhacker.no-ip.biz:1604

Mutex

DC_MUTEX-D7D35UC

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    ohhRS�*Sjp-*

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

rc4.plain

Extracted

Family

darkcomet

Attributes
  • gencode

  • install

    false

  • offline_keylogger

    false

  • persistence

    false

rc4.plain

Targets

    • Target

      JaffaCakes118_e9caf32e33bb954fff2c3fadb1e04a8d

    • Size

      1.3MB

    • MD5

      e9caf32e33bb954fff2c3fadb1e04a8d

    • SHA1

      7944adf221b1439bae9338332a270400c03bb77a

    • SHA256

      a84f921834aef064417f4e391e1e29d34b4d0bc04989e9cbbbd64318f8708e91

    • SHA512

      a3308bdcf72d6fc40df8fbe34c0a52da3c16fa228d10a8aa03941333a1015aa17b27c96808dbcdd47ee1d817a1b2f51777f2c2f9b230d8b2a317d7bcfde01412

    • SSDEEP

      24576:y4ktSIvTfZbkXWr+ypPiq1hCnCSyWhrtNSNXjJH4AUgMGs:8YkxQmKyplLS3RtNQCAD2

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Modifies WinLogon for persistence

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks