General

  • Target

    JaffaCakes118_ff6773734d53c18f9ce325fbf853fc75

  • Size

    1.1MB

  • Sample

    250216-ey8j7ssmh1

  • MD5

    ff6773734d53c18f9ce325fbf853fc75

  • SHA1

    d8527ed51bb03e3de2409ad5b76130cae83816c3

  • SHA256

    11e041cf0b21bcd2c148b26d21e5fe8fe36279f74c0ed57746e5d0f7459eea20

  • SHA512

    b2b49a5f14b581233b0cf49d3e9d9d4295de57f002f6e036299d27fe66206ee787118d8b7da174c60a64c94af09ada62c969254bb621c19ebd24a3f9e798149f

  • SSDEEP

    24576:8b6WS4ErP7wsecweQMCX6uHJ3uBKFz0WW/p9dEZF6D6sZvr:fIErPEsRYPnp36f/ztDZ

Malware Config

Extracted

Family

darkcomet

Botnet

admin

C2

rjsgh1225.no-ip.biz:1604

Mutex

DC_MUTEX-K7RCGUY

Attributes
  • InstallPath

    ctfmon.exe

  • gencode

    XpW893st4Q07

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    ctfmon

rc4.plain

Targets

    • Target

      JaffaCakes118_ff6773734d53c18f9ce325fbf853fc75

    • Size

      1.1MB

    • MD5

      ff6773734d53c18f9ce325fbf853fc75

    • SHA1

      d8527ed51bb03e3de2409ad5b76130cae83816c3

    • SHA256

      11e041cf0b21bcd2c148b26d21e5fe8fe36279f74c0ed57746e5d0f7459eea20

    • SHA512

      b2b49a5f14b581233b0cf49d3e9d9d4295de57f002f6e036299d27fe66206ee787118d8b7da174c60a64c94af09ada62c969254bb621c19ebd24a3f9e798149f

    • SSDEEP

      24576:8b6WS4ErP7wsecweQMCX6uHJ3uBKFz0WW/p9dEZF6D6sZvr:fIErPEsRYPnp36f/ztDZ

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Modifies WinLogon for persistence

    • Modifies firewall policy service

    • Modifies security service

    • Windows security bypass

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks