General
-
Target
JaffaCakes118_0e01525d20d82472d8f4f4baeceea7c0
-
Size
353KB
-
Sample
250220-y845bawly6
-
MD5
0e01525d20d82472d8f4f4baeceea7c0
-
SHA1
735ff695990bfc7a4b926297bb2c925da5d77da7
-
SHA256
b5880746d859edbfc53d9118d7ce6bad58c20e9f67270b1ffcfa4cfc177cb655
-
SHA512
65b350c6c28b66aad48f2427032d9b1df2926b50d8dc6868d4135dea49a26fc02d321b560b663198a856129e4a1893850e5c73b5cd7b3a95330137cb100868c0
-
SSDEEP
6144:2JD6KarVGMX0mNsVvpyTpZY63vwPOj4LOAhz6tUIBwWcOUl2jXQcXForOM/m1n6:uDGRsuspipaSSW4zhSBwWcODsc1aOM/Y
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_0e01525d20d82472d8f4f4baeceea7c0.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_0e01525d20d82472d8f4f4baeceea7c0.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
darkcomet
oksha
fuck-all.no-ip.info:277
DC_MUTEX-0RTF6BF
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
FkQYb2bTZw5j
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
MicroUpdate
Extracted
darkcomet
- gencode
-
install
false
-
offline_keylogger
false
-
persistence
false
Targets
-
-
Target
JaffaCakes118_0e01525d20d82472d8f4f4baeceea7c0
-
Size
353KB
-
MD5
0e01525d20d82472d8f4f4baeceea7c0
-
SHA1
735ff695990bfc7a4b926297bb2c925da5d77da7
-
SHA256
b5880746d859edbfc53d9118d7ce6bad58c20e9f67270b1ffcfa4cfc177cb655
-
SHA512
65b350c6c28b66aad48f2427032d9b1df2926b50d8dc6868d4135dea49a26fc02d321b560b663198a856129e4a1893850e5c73b5cd7b3a95330137cb100868c0
-
SSDEEP
6144:2JD6KarVGMX0mNsVvpyTpZY63vwPOj4LOAhz6tUIBwWcOUl2jXQcXForOM/m1n6:uDGRsuspipaSSW4zhSBwWcODsc1aOM/Y
-
Darkcomet family
-
Modifies WinLogon for persistence
-
Modifies firewall policy service
-
Modifies security service
-
Windows security bypass
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Windows security modification
-
Adds Run key to start application
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
7