General

  • Target

    JaffaCakes118_28d4575ac8a1304e6a95fab1a93f7352

  • Size

    251KB

  • Sample

    250226-1tkhgavp14

  • MD5

    28d4575ac8a1304e6a95fab1a93f7352

  • SHA1

    fd4e44ac868893e8cc3e2878e0d9a74b2b4650ec

  • SHA256

    0e2038cfb6ccf86b41faa3b72f18c9a809c71b30b58ee8e13fa6d0080f31498f

  • SHA512

    b1ac195e8e205a4fc41101952de65d17ae39dc0942f741bebf98d54e15cc98e09593f4818c5a43e5c6eae1fc0b5275f093d8e99da1ae96d352ce7781e9048396

  • SSDEEP

    6144:2cNYS996KFifeVjBpeExgVTFSXFoMc5RhCaL37:2cW7KEZlPzCy37

Malware Config

Extracted

Family

darkcomet

Botnet

new

C2

legolas8.no-ip.biz:1600

Mutex

DC_MUTEX-QHPRJU6

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    2YhVKUacQCh2

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

rc4.plain

Targets

    • Target

      JaffaCakes118_28d4575ac8a1304e6a95fab1a93f7352

    • Size

      251KB

    • MD5

      28d4575ac8a1304e6a95fab1a93f7352

    • SHA1

      fd4e44ac868893e8cc3e2878e0d9a74b2b4650ec

    • SHA256

      0e2038cfb6ccf86b41faa3b72f18c9a809c71b30b58ee8e13fa6d0080f31498f

    • SHA512

      b1ac195e8e205a4fc41101952de65d17ae39dc0942f741bebf98d54e15cc98e09593f4818c5a43e5c6eae1fc0b5275f093d8e99da1ae96d352ce7781e9048396

    • SSDEEP

      6144:2cNYS996KFifeVjBpeExgVTFSXFoMc5RhCaL37:2cW7KEZlPzCy37

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Modifies WinLogon for persistence

    • Windows security bypass

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks