General

  • Target

    JaffaCakes118_22417ced93044d377d8c8c791c952090

  • Size

    385KB

  • Sample

    250225-h5ahjawmw7

  • MD5

    22417ced93044d377d8c8c791c952090

  • SHA1

    0478205a61cff38a6cecf21f5d112956bb36ed49

  • SHA256

    950582ca83f3793e48268be3385be6e1fcbcb35c5377118ca042bd0813e6fd69

  • SHA512

    cc1d546b5dbee96aa07c37cf7c8d73035fdeeab23cf709c17777fd065e4fb256ab1b12d405048221e9af45f56b9fb80157e7b35c46d6bff7cf96a3a208b1d3ba

  • SSDEEP

    12288:NWUtK/gTC7PLxIkjiw+8iG6TEgeM8F/ydYDmj:NWUtK/wWP/jiLQCONWbj

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

stevecarl2010.zapto.org:21

Mutex

DC_MUTEX-U6Y530W

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    AT34ypRw3ul4

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    MicroUpdate

rc4.plain

Extracted

Family

latentbot

C2

stevecarl2010.zapto.org

Targets

    • Target

      JaffaCakes118_22417ced93044d377d8c8c791c952090

    • Size

      385KB

    • MD5

      22417ced93044d377d8c8c791c952090

    • SHA1

      0478205a61cff38a6cecf21f5d112956bb36ed49

    • SHA256

      950582ca83f3793e48268be3385be6e1fcbcb35c5377118ca042bd0813e6fd69

    • SHA512

      cc1d546b5dbee96aa07c37cf7c8d73035fdeeab23cf709c17777fd065e4fb256ab1b12d405048221e9af45f56b9fb80157e7b35c46d6bff7cf96a3a208b1d3ba

    • SSDEEP

      12288:NWUtK/gTC7PLxIkjiw+8iG6TEgeM8F/ydYDmj:NWUtK/wWP/jiLQCONWbj

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • LatentBot

      Modular trojan written in Delphi which has been in-the-wild since 2013.

    • Latentbot family

    • Modifies WinLogon for persistence

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks