General

  • Target

    JaffaCakes118_23fad9bdb3671ccef29000a91f57827d

  • Size

    1.4MB

  • Sample

    250226-gv8rxatpw6

  • MD5

    23fad9bdb3671ccef29000a91f57827d

  • SHA1

    82c91d1678dd7afd218a6a27f98a16ca81fd1216

  • SHA256

    cf8736f3a5534eaee5e874949ad48f6d1aef9a6095365f0c571dbcd20c360a0e

  • SHA512

    2b6cae215920fb5f8ce579764f4d4d0c0b047df904497142766d8ff6be7c3618ba7ac75bdcfd738e6aff983d893b2837b94beed5fc5a5acd67fec62027cbe5bf

  • SSDEEP

    24576:uHz+XNSrQR2qRSi1Vjm3WNJUnVSXvZFZStuh4spV:uHz+9SQD1tmsJUCZFMuH

Malware Config

Extracted

Family

darkcomet

Attributes
  • gencode

  • install

    false

  • offline_keylogger

    false

  • persistence

    false

rc4.plain

Extracted

Family

darkcomet

Botnet

siber 52

C2

sibersavasci.no-ip.biz:1604

Mutex

DC_MUTEX-R13X98M

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    glwAYwvN8Yx7

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

rc4.plain

Targets

    • Target

      JaffaCakes118_23fad9bdb3671ccef29000a91f57827d

    • Size

      1.4MB

    • MD5

      23fad9bdb3671ccef29000a91f57827d

    • SHA1

      82c91d1678dd7afd218a6a27f98a16ca81fd1216

    • SHA256

      cf8736f3a5534eaee5e874949ad48f6d1aef9a6095365f0c571dbcd20c360a0e

    • SHA512

      2b6cae215920fb5f8ce579764f4d4d0c0b047df904497142766d8ff6be7c3618ba7ac75bdcfd738e6aff983d893b2837b94beed5fc5a5acd67fec62027cbe5bf

    • SSDEEP

      24576:uHz+XNSrQR2qRSi1Vjm3WNJUnVSXvZFZStuh4spV:uHz+9SQD1tmsJUCZFMuH

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Modifies WinLogon for persistence

    • Modifies security service

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Drops file in Drivers directory

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks