General
-
Target
JaffaCakes118_10f08c93a2b6b591e89042bc3f693080
-
Size
543KB
-
Sample
250221-hkfh2swlck
-
MD5
10f08c93a2b6b591e89042bc3f693080
-
SHA1
d501b8b53904b0b114b75d2951e1fc22c5a99b39
-
SHA256
ccc3f642afaddf0144949679f5228ab215a2784dc814a874b4aba67b22a14c2a
-
SHA512
7df55762f1ca3e5ddfab0143fdbb832356598ac1a8984b5e7c97cdcaaa22adabaffc47981b7a10ed189a508566e58bdc03c7b28826bbafab062e65bb1464bc09
-
SSDEEP
12288:uU63xdWrhwW0vYXeZ9m94tu6nlyYpqtr611s:kTohcvYXCDRpqtrOs
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_10f08c93a2b6b591e89042bc3f693080.exe
Resource
win7-20241023-en
Malware Config
Extracted
darkcomet
Guest16
darkcometger.zapto.org:21
DC_MUTEX-474VLNK
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
Y1zERirQMAyb
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
MicroUpdate
Targets
-
-
Target
JaffaCakes118_10f08c93a2b6b591e89042bc3f693080
-
Size
543KB
-
MD5
10f08c93a2b6b591e89042bc3f693080
-
SHA1
d501b8b53904b0b114b75d2951e1fc22c5a99b39
-
SHA256
ccc3f642afaddf0144949679f5228ab215a2784dc814a874b4aba67b22a14c2a
-
SHA512
7df55762f1ca3e5ddfab0143fdbb832356598ac1a8984b5e7c97cdcaaa22adabaffc47981b7a10ed189a508566e58bdc03c7b28826bbafab062e65bb1464bc09
-
SSDEEP
12288:uU63xdWrhwW0vYXeZ9m94tu6nlyYpqtr611s:kTohcvYXCDRpqtrOs
-
Darkcomet family
-
Modifies WinLogon for persistence
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1