General

  • Target

    JaffaCakes118_10f08c93a2b6b591e89042bc3f693080

  • Size

    543KB

  • Sample

    250221-hkfh2swlck

  • MD5

    10f08c93a2b6b591e89042bc3f693080

  • SHA1

    d501b8b53904b0b114b75d2951e1fc22c5a99b39

  • SHA256

    ccc3f642afaddf0144949679f5228ab215a2784dc814a874b4aba67b22a14c2a

  • SHA512

    7df55762f1ca3e5ddfab0143fdbb832356598ac1a8984b5e7c97cdcaaa22adabaffc47981b7a10ed189a508566e58bdc03c7b28826bbafab062e65bb1464bc09

  • SSDEEP

    12288:uU63xdWrhwW0vYXeZ9m94tu6nlyYpqtr611s:kTohcvYXCDRpqtrOs

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

darkcometger.zapto.org:21

Mutex

DC_MUTEX-474VLNK

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    Y1zERirQMAyb

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    MicroUpdate

rc4.plain

Targets

    • Target

      JaffaCakes118_10f08c93a2b6b591e89042bc3f693080

    • Size

      543KB

    • MD5

      10f08c93a2b6b591e89042bc3f693080

    • SHA1

      d501b8b53904b0b114b75d2951e1fc22c5a99b39

    • SHA256

      ccc3f642afaddf0144949679f5228ab215a2784dc814a874b4aba67b22a14c2a

    • SHA512

      7df55762f1ca3e5ddfab0143fdbb832356598ac1a8984b5e7c97cdcaaa22adabaffc47981b7a10ed189a508566e58bdc03c7b28826bbafab062e65bb1464bc09

    • SSDEEP

      12288:uU63xdWrhwW0vYXeZ9m94tu6nlyYpqtr611s:kTohcvYXCDRpqtrOs

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Modifies WinLogon for persistence

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks