General

  • Target

    JaffaCakes118_1fe3ed3876fe887254bd14d3684662dc

  • Size

    881KB

  • Sample

    250223-k7x3qa1kcs

  • MD5

    1fe3ed3876fe887254bd14d3684662dc

  • SHA1

    fd6ed6ee4e51db042951c67a73bc62f0b85e2d62

  • SHA256

    2800ffefab274beaf594de0dd3ba8532638b4978213d55a0cadab148b8f32df7

  • SHA512

    c710073712be256b833e353e2d1d536a2e1b9c30055cee12f5ae1866af5ac38a3cc35bc31fcbff316a5225d8258dfa1f61539c1fa36058a6589c2c42c74789c6

  • SSDEEP

    24576:TbV4yIDvZf7R5q58Pnq1jPfBQbPsovgURBZhS6B8Ta/Lyy:TbV4yIpw8P8jhQbPBRtqTa/u

Malware Config

Extracted

Family

darkcomet

Attributes
  • gencode

  • install

    false

  • offline_keylogger

    false

  • persistence

    false

rc4.plain

Extracted

Family

darkcomet

Botnet

ms-dos

C2

pourmoi.zapto.org:2000

pourmoi.zapto.org:200

pourmoi.zapto.org:1604

pourmoi.zapto.org:164

pourmoi.zapto.org:80

Mutex

DC_MUTEX-M5FD2QE

Attributes
  • gencode

    dS$=Gi/U7yGB

  • install

    false

  • offline_keylogger

    true

  • password

    da06101266

  • persistence

    false

rc4.plain

Targets

    • Target

      JaffaCakes118_1fe3ed3876fe887254bd14d3684662dc

    • Size

      881KB

    • MD5

      1fe3ed3876fe887254bd14d3684662dc

    • SHA1

      fd6ed6ee4e51db042951c67a73bc62f0b85e2d62

    • SHA256

      2800ffefab274beaf594de0dd3ba8532638b4978213d55a0cadab148b8f32df7

    • SHA512

      c710073712be256b833e353e2d1d536a2e1b9c30055cee12f5ae1866af5ac38a3cc35bc31fcbff316a5225d8258dfa1f61539c1fa36058a6589c2c42c74789c6

    • SSDEEP

      24576:TbV4yIDvZf7R5q58Pnq1jPfBQbPsovgURBZhS6B8Ta/Lyy:TbV4yIpw8P8jhQbPBRtqTa/u

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks