General

  • Target

    JaffaCakes118_15fa9e49e0ce430a773653a827d52197

  • Size

    1.2MB

  • Sample

    250221-3xsz5asrdz

  • MD5

    15fa9e49e0ce430a773653a827d52197

  • SHA1

    36066f8ca7341eac526f899280616630f0dab62e

  • SHA256

    9f4c44b4e61565481ab3742f1d1d0f43105fe0bc1648ae59fae5c643d1d7f545

  • SHA512

    a8fc141292f2de8471c1a84c6d2cab09929096e151d491434e8aabf86822849124af039f072489aee5b2e085f88d86891cb09c32f75ba77be4d244767a2e1a2f

  • SSDEEP

    24576:3O7PTB3PoTTaXaaRHy/+Hb9nipw/NK9LlXdi0coKmrWN95pzvc1jrGEAq:ARIT4sGxn/g9Ltdi1mrSp4vGEH

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

ahmedmisho81.zapto.org:1600

Mutex

DC_MUTEX-R7D4M12

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    RGaJi6SBR5QL

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

rc4.plain

Extracted

Family

latentbot

C2

ahmedmisho81.zapto.org

Targets

    • Target

      JaffaCakes118_15fa9e49e0ce430a773653a827d52197

    • Size

      1.2MB

    • MD5

      15fa9e49e0ce430a773653a827d52197

    • SHA1

      36066f8ca7341eac526f899280616630f0dab62e

    • SHA256

      9f4c44b4e61565481ab3742f1d1d0f43105fe0bc1648ae59fae5c643d1d7f545

    • SHA512

      a8fc141292f2de8471c1a84c6d2cab09929096e151d491434e8aabf86822849124af039f072489aee5b2e085f88d86891cb09c32f75ba77be4d244767a2e1a2f

    • SSDEEP

      24576:3O7PTB3PoTTaXaaRHy/+Hb9nipw/NK9LlXdi0coKmrWN95pzvc1jrGEAq:ARIT4sGxn/g9Ltdi1mrSp4vGEH

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • LatentBot

      Modular trojan written in Delphi which has been in-the-wild since 2013.

    • Latentbot family

    • Modifies WinLogon for persistence

    • Modifies firewall policy service

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks