General

  • Target

    JaffaCakes118_0d28fc3879265327dd060ab12a6fa286

  • Size

    715KB

  • Sample

    250220-vy5fjs1mbl

  • MD5

    0d28fc3879265327dd060ab12a6fa286

  • SHA1

    3d4a79141b72aec73ff29b3295967b5aa593e30a

  • SHA256

    170a4dda6f05a5ee57b3feeb4eadd03701b91de14f8704780cf2181bb88fcd92

  • SHA512

    548a91b297a2bd1fb3f90741291bb80d713112ed026cfb40205077fba3f2a80e133567c52cd04081a8ecf5e2f844387508374843074787f506d4b6f20f1799a3

  • SSDEEP

    12288:Y9I29PCMjCzZrOIMAlX/ORCHgjhtcz2WLdDsdxnTDTAOfB+T:Yq296PzZrmVjFGzv5IxnHTAq+T

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

t4t00.no-ip.biz:200

Mutex

DC_MUTEX-RJPJVEK

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    6vjzZ6Fn782i

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    rundll32

rc4.plain

Targets

    • Target

      JaffaCakes118_0d28fc3879265327dd060ab12a6fa286

    • Size

      715KB

    • MD5

      0d28fc3879265327dd060ab12a6fa286

    • SHA1

      3d4a79141b72aec73ff29b3295967b5aa593e30a

    • SHA256

      170a4dda6f05a5ee57b3feeb4eadd03701b91de14f8704780cf2181bb88fcd92

    • SHA512

      548a91b297a2bd1fb3f90741291bb80d713112ed026cfb40205077fba3f2a80e133567c52cd04081a8ecf5e2f844387508374843074787f506d4b6f20f1799a3

    • SSDEEP

      12288:Y9I29PCMjCzZrOIMAlX/ORCHgjhtcz2WLdDsdxnTDTAOfB+T:Yq296PzZrmVjFGzv5IxnHTAq+T

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Modifies WinLogon for persistence

    • Modiloader family

    • ModiLoader Second Stage

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks