General

  • Target

    JaffaCakes118_f57a44b9119741eabe845a9c7b93e244

  • Size

    1.7MB

  • Sample

    250214-j2tmnsynbx

  • MD5

    f57a44b9119741eabe845a9c7b93e244

  • SHA1

    b7df58785a4b94b0aa85dede5c7ca18335b168f6

  • SHA256

    3a0e0578fb3c847812e19fe3ab309deceaab84caa58e600ff390d024de0c49e9

  • SHA512

    433260f7606d95788df867aa53e4708645bae02cea862ea0cccdbc1a8277db7ef68dad584bc7dcf645caa0fd0eb0cc44e31a1850dcdbe89084ddaa912079169e

  • SSDEEP

    24576:XKNXWV9rkTiCe1F0L8QiB/RjKzXVQvGrM8gDrapiJmp:6gvkEI1iBRKzXdOJ

Malware Config

Extracted

Family

darkcomet

Botnet

HACKED

C2

rootanomaly.no-ip.info:1604

Mutex

DC_MUTEX-V75M4ED

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    C/yB%GDVZwNn

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

rc4.plain

Targets

    • Target

      JaffaCakes118_f57a44b9119741eabe845a9c7b93e244

    • Size

      1.7MB

    • MD5

      f57a44b9119741eabe845a9c7b93e244

    • SHA1

      b7df58785a4b94b0aa85dede5c7ca18335b168f6

    • SHA256

      3a0e0578fb3c847812e19fe3ab309deceaab84caa58e600ff390d024de0c49e9

    • SHA512

      433260f7606d95788df867aa53e4708645bae02cea862ea0cccdbc1a8277db7ef68dad584bc7dcf645caa0fd0eb0cc44e31a1850dcdbe89084ddaa912079169e

    • SSDEEP

      24576:XKNXWV9rkTiCe1F0L8QiB/RjKzXVQvGrM8gDrapiJmp:6gvkEI1iBRKzXdOJ

    • Blackshades

      Blackshades is a remote access trojan with various capabilities.

    • Blackshades family

    • Blackshades payload

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Modifies WinLogon for persistence

    • Modifies firewall policy service

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks