General

  • Target

    JaffaCakes118_2bd7cd4c15fa82d33dfbbd63fe751be6

  • Size

    1.4MB

  • Sample

    250227-jy7p5asnt7

  • MD5

    2bd7cd4c15fa82d33dfbbd63fe751be6

  • SHA1

    0876eedc0333955f4c471c2cec441e4155e9e71f

  • SHA256

    5918de565bef17006e9b3ec2ef017d786aad4f27f2912fea242d471f52e33652

  • SHA512

    17839fee0efa17e108a909768ca5e195673338177ea7f3b919436fd3c2cfdab8a441eec546337cec04df6f5e3a4017f6885ad855d67cb9f0efbc3a8643ad74f7

  • SSDEEP

    24576:kRmJkcoQricOIQxiZY1ia3BEX7o0wAZbn8DEu94ZcvAm45:hJZoQrbTFZY1iaREXk0wWbT+4+om45

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16_min

C2

176.31.65.184:1604

Mutex

DCMIN_MUTEX-GMFC3TS

Attributes
  • InstallPath

    DCSCMIN\IMDCSC.exe

  • gencode

    ysRvVVnKt7W8

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    DarkComet RAT

rc4.plain

Targets

    • Target

      JaffaCakes118_2bd7cd4c15fa82d33dfbbd63fe751be6

    • Size

      1.4MB

    • MD5

      2bd7cd4c15fa82d33dfbbd63fe751be6

    • SHA1

      0876eedc0333955f4c471c2cec441e4155e9e71f

    • SHA256

      5918de565bef17006e9b3ec2ef017d786aad4f27f2912fea242d471f52e33652

    • SHA512

      17839fee0efa17e108a909768ca5e195673338177ea7f3b919436fd3c2cfdab8a441eec546337cec04df6f5e3a4017f6885ad855d67cb9f0efbc3a8643ad74f7

    • SSDEEP

      24576:kRmJkcoQricOIQxiZY1ia3BEX7o0wAZbn8DEu94ZcvAm45:hJZoQrbTFZY1iaREXk0wWbT+4+om45

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Modifies WinLogon for persistence

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks