General

  • Target

    JaffaCakes118_0774749da63e45df3afe7ea84bb12f91

  • Size

    1.0MB

  • Sample

    250219-ym8klszkv7

  • MD5

    0774749da63e45df3afe7ea84bb12f91

  • SHA1

    398b7eefd347c60f8d9a1848ba57a2f8fe4be72e

  • SHA256

    25b1cf4bbcc2c070fe63176d7546fd3ed764405cb5fdc376aa04441b0b6fa7e9

  • SHA512

    8646b52b8ce1e7e9be23f7c97963a5524c3f16699f9e182c4138f7c61090bd8235fdc9bed559518400016f666e3da0fca839077dc11f49030ff64fcbb6d0ff8d

  • SSDEEP

    24576:2PGSY91VwNJcFMqTZmUMyMPy+mfeK15bSuto+k0/0R3i542tr:sGJyVTUKWfecFSutjkq4wf

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

faction212.no-ip.biz:1430

Mutex

DC_MUTEX-L83HE0V

Attributes
  • InstallPath

    system32\winlogon.exe

  • gencode

    YL8YJdld1Hg+

  • install

    true

  • offline_keylogger

    true

  • password

    123456

  • persistence

    true

  • reg_key

    winlogon

rc4.plain

Targets

    • Target

      JaffaCakes118_0774749da63e45df3afe7ea84bb12f91

    • Size

      1.0MB

    • MD5

      0774749da63e45df3afe7ea84bb12f91

    • SHA1

      398b7eefd347c60f8d9a1848ba57a2f8fe4be72e

    • SHA256

      25b1cf4bbcc2c070fe63176d7546fd3ed764405cb5fdc376aa04441b0b6fa7e9

    • SHA512

      8646b52b8ce1e7e9be23f7c97963a5524c3f16699f9e182c4138f7c61090bd8235fdc9bed559518400016f666e3da0fca839077dc11f49030ff64fcbb6d0ff8d

    • SSDEEP

      24576:2PGSY91VwNJcFMqTZmUMyMPy+mfeK15bSuto+k0/0R3i542tr:sGJyVTUKWfecFSutjkq4wf

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Modifies WinLogon for persistence

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks