General
-
Target
JaffaCakes118_22417ced93044d377d8c8c791c952090
-
Size
385KB
-
Sample
250225-h5ahjawmw7
-
MD5
22417ced93044d377d8c8c791c952090
-
SHA1
0478205a61cff38a6cecf21f5d112956bb36ed49
-
SHA256
950582ca83f3793e48268be3385be6e1fcbcb35c5377118ca042bd0813e6fd69
-
SHA512
cc1d546b5dbee96aa07c37cf7c8d73035fdeeab23cf709c17777fd065e4fb256ab1b12d405048221e9af45f56b9fb80157e7b35c46d6bff7cf96a3a208b1d3ba
-
SSDEEP
12288:NWUtK/gTC7PLxIkjiw+8iG6TEgeM8F/ydYDmj:NWUtK/wWP/jiLQCONWbj
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_22417ced93044d377d8c8c791c952090.exe
Resource
win7-20240903-en
Malware Config
Extracted
darkcomet
Guest16
stevecarl2010.zapto.org:21
DC_MUTEX-U6Y530W
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
AT34ypRw3ul4
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
MicroUpdate
Extracted
latentbot
stevecarl2010.zapto.org
Targets
-
-
Target
JaffaCakes118_22417ced93044d377d8c8c791c952090
-
Size
385KB
-
MD5
22417ced93044d377d8c8c791c952090
-
SHA1
0478205a61cff38a6cecf21f5d112956bb36ed49
-
SHA256
950582ca83f3793e48268be3385be6e1fcbcb35c5377118ca042bd0813e6fd69
-
SHA512
cc1d546b5dbee96aa07c37cf7c8d73035fdeeab23cf709c17777fd065e4fb256ab1b12d405048221e9af45f56b9fb80157e7b35c46d6bff7cf96a3a208b1d3ba
-
SSDEEP
12288:NWUtK/gTC7PLxIkjiw+8iG6TEgeM8F/ydYDmj:NWUtK/wWP/jiLQCONWbj
-
Darkcomet family
-
Latentbot family
-
Modifies WinLogon for persistence
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1