General
-
Target
JaffaCakes118_0da8b9ab1e463a2739cde37c8be30554
-
Size
516KB
-
Sample
250220-xv3hwsvky8
-
MD5
0da8b9ab1e463a2739cde37c8be30554
-
SHA1
4b15eb3cdd135b533581be36c97e2d5a3682c8bd
-
SHA256
d166c835cea186cd0383e4445ec61af0f303db618eeb35d035d6063f976ae5a9
-
SHA512
8d65df421fbbbcab3f91335877793bc1b748b0cddb8389a3b59408bf4bed1d633fa6bea3bd383c23e17b28a8d3180a4970d988198bba467e4a58526757619654
-
SSDEEP
12288:dbpsDfpI9pmfjiBFvo6zLNCQ+IRmLKEs7ly5eVRtxwCF3aWvF0JQww3wFt:Iu9crkQCmLJ2YBZ
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_0da8b9ab1e463a2739cde37c8be30554.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_0da8b9ab1e463a2739cde37c8be30554.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
darkcomet
PADILASAHIWA
drkc.no-ip.biz:1604
DC_MUTEX-N9XP8RG
-
InstallPath
MSDCSC\svchost.exe
-
gencode
8TGPRFaMPrpw
-
install
true
-
offline_keylogger
true
-
password
tingil123
-
persistence
true
-
reg_key
MicrosoftUpdate
Targets
-
-
Target
JaffaCakes118_0da8b9ab1e463a2739cde37c8be30554
-
Size
516KB
-
MD5
0da8b9ab1e463a2739cde37c8be30554
-
SHA1
4b15eb3cdd135b533581be36c97e2d5a3682c8bd
-
SHA256
d166c835cea186cd0383e4445ec61af0f303db618eeb35d035d6063f976ae5a9
-
SHA512
8d65df421fbbbcab3f91335877793bc1b748b0cddb8389a3b59408bf4bed1d633fa6bea3bd383c23e17b28a8d3180a4970d988198bba467e4a58526757619654
-
SSDEEP
12288:dbpsDfpI9pmfjiBFvo6zLNCQ+IRmLKEs7ly5eVRtxwCF3aWvF0JQww3wFt:Iu9crkQCmLJ2YBZ
-
Darkcomet family
-
Modifies WinLogon for persistence
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
2