General

  • Target

    JaffaCakes118_ece51a428d92445574c55ee55a0d6084

  • Size

    320KB

  • Sample

    250212-ef2nyaykgj

  • MD5

    ece51a428d92445574c55ee55a0d6084

  • SHA1

    5e8b66616465f4cdddddeda2765bea1b60f1f7f4

  • SHA256

    e5e7c726a5de079b2c83db2ac5ff201d8472ac2df9be70c961984246a22755da

  • SHA512

    95b6be7eca1717df16943c37821b65ee8a68747374833e18e2b4456e473162b57799a17f218549ee3feea98d0c05c81cf15b4f2f25aeacc079dcff5881b6076a

  • SSDEEP

    6144:6G78BQfU3w0E5oRPa3ZF1nTqpjFoXpxHT1fLl7UErm1vz/e/GTU6:B78B/32CPAnTAoX3xBS46

Malware Config

Extracted

Family

darkcomet

Botnet

Kurban

C2

cruee.no-ip.biz:6300

127.0.0.1:6300

Mutex

DC_MUTEX-72WLYVD

Attributes
  • InstallPath

    MSDCSC\svchost.exe

  • gencode

    ohR9oxZlMZ8r

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

rc4.plain

Targets

    • Target

      Point Blank NG.exe

    • Size

      663KB

    • MD5

      cef378af5fdeba7f7a77435b75a75566

    • SHA1

      1301bb0c40a78f384a1586adf5275e0835728e48

    • SHA256

      452125999dfaaf54ce021efa0b70281ae3cb2592d55f7e5a4c8ede94aabcf85f

    • SHA512

      fa05795f175d4c48cbc77f1d26ddb67059602fa382f09876a090fd79e0e77c615771291f214c2122448ae7e7b635dd344345adf81e11e7ddb5d8521338a5da84

    • SSDEEP

      12288:u9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/hq:6Z1xuVVjfFoynPaVBUR8f+kN10EBs

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Modifies WinLogon for persistence

    • Modifies firewall policy service

    • Modifies security service

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Downloads MZ/PE file

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks