General
-
Target
JaffaCakes118_0e1eb8cff971ae5cbd4dc988764e420f
-
Size
423KB
-
Sample
250220-zm2bzavjdw
-
MD5
0e1eb8cff971ae5cbd4dc988764e420f
-
SHA1
8c7f60eb1be1c8f89aad7eb26c472437321b95bc
-
SHA256
48f6c4f34922b01cfdea0eb8e90798d6334678aa24ffb60cd284028bf9cca7de
-
SHA512
a428306391973c802f81e96b7d123aafebe5c6eb83eb54dc7c962eb256aa2eb37f8ae22f986fcaeae9da4a7c753ee460504e0ff297c9a62d46d337c84c68530d
-
SSDEEP
6144:VSncR8Zp5Ogg3VuwK0kiKPliq6peQmKbx+y8jIDIM8TAex5xqDfb9/6hSBhMH:84kqgg3AR0kbi7y28Ur8Td5mb1/O
Behavioral task
behavioral1
Sample
JaffaCakes118_0e1eb8cff971ae5cbd4dc988764e420f.exe
Resource
win7-20240903-en
Malware Config
Extracted
darkcomet
Server1
192.168.178.20:1604
DC_MUTEX-H3BKM6P
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
ANpydjYglJBM
-
install
true
-
offline_keylogger
true
-
password
ACDC2009#a
-
persistence
false
-
reg_key
MicroUpdate
Targets
-
-
Target
JaffaCakes118_0e1eb8cff971ae5cbd4dc988764e420f
-
Size
423KB
-
MD5
0e1eb8cff971ae5cbd4dc988764e420f
-
SHA1
8c7f60eb1be1c8f89aad7eb26c472437321b95bc
-
SHA256
48f6c4f34922b01cfdea0eb8e90798d6334678aa24ffb60cd284028bf9cca7de
-
SHA512
a428306391973c802f81e96b7d123aafebe5c6eb83eb54dc7c962eb256aa2eb37f8ae22f986fcaeae9da4a7c753ee460504e0ff297c9a62d46d337c84c68530d
-
SSDEEP
6144:VSncR8Zp5Ogg3VuwK0kiKPliq6peQmKbx+y8jIDIM8TAex5xqDfb9/6hSBhMH:84kqgg3AR0kbi7y28Ur8Td5mb1/O
-
Darkcomet family
-
Modifies WinLogon for persistence
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1