General

  • Target

    JaffaCakes118_22a8ef9b714980ecc5a5710b2ed240b1

  • Size

    285KB

  • Sample

    250225-ty5wmswmt5

  • MD5

    22a8ef9b714980ecc5a5710b2ed240b1

  • SHA1

    b6b2b713033c0d1ff58b5f245eaf1e8c9535acd4

  • SHA256

    f4722a009a957450c5ab056af2fbe537eb0a1b051ce82129af5d5b7f0c9899c1

  • SHA512

    ff33ce49178dc282735f50bfcfb750f349f9593367d549db0c138c5a27ac4e537f77c1678b316205285979d993c233a9cc712316b53b3553f5ef15cc1e84e594

  • SSDEEP

    6144:+D7cY2fgssM7Wirg9KXylmRiL+QMeC/i6isqX7UovnONztByipwxZLOxy:+l8E4w5huat7UovONzbXwn+y

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

192.168.178.24:1604

Mutex

DC_MUTEX-0QNYAHY

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    MvnLUP9hFAdD

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

rc4.plain

Targets

    • Target

      JaffaCakes118_22a8ef9b714980ecc5a5710b2ed240b1

    • Size

      285KB

    • MD5

      22a8ef9b714980ecc5a5710b2ed240b1

    • SHA1

      b6b2b713033c0d1ff58b5f245eaf1e8c9535acd4

    • SHA256

      f4722a009a957450c5ab056af2fbe537eb0a1b051ce82129af5d5b7f0c9899c1

    • SHA512

      ff33ce49178dc282735f50bfcfb750f349f9593367d549db0c138c5a27ac4e537f77c1678b316205285979d993c233a9cc712316b53b3553f5ef15cc1e84e594

    • SSDEEP

      6144:+D7cY2fgssM7Wirg9KXylmRiL+QMeC/i6isqX7UovnONztByipwxZLOxy:+l8E4w5huat7UovONzbXwn+y

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Modifies WinLogon for persistence

    • Modifies firewall policy service

    • Modifies security service

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks