General

  • Target

    JaffaCakes118_2cdfc4b3a08b3113c9e79eb93515b06e

  • Size

    752KB

  • Sample

    250227-nfn8aawny7

  • MD5

    2cdfc4b3a08b3113c9e79eb93515b06e

  • SHA1

    c385f64546c66dac6e93f3c8cd734dee8289a276

  • SHA256

    3150800b5673c13bcfa23977cd2dfebccabf45f88a4457f97f389dfc836dccfb

  • SHA512

    dd5696d790fbd2e18207c9dac66deef96244c223df9854f930ebc5d72ec90ee63a8dc3a4e5de7079714127bd9cad21074a3a2a28faccac5c8b084f7b83f986c4

  • SSDEEP

    12288:rDzRWY9Og7jdSR0Do2TO5SetJkqxKvmbXrDQevOKqO/VjpSywbJr:3zRD4R07fcOqxtiOlc1

Malware Config

Extracted

Family

darkcomet

Botnet

1865Patch

C2

sharpn3ss.no-ip.org:1604

Mutex

DC_MUTEX-LV8B1JS

Attributes
  • InstallPath

    spoolsv.exe

  • gencode

    vqX6z6K+%#*B

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    SYSTEM

rc4.plain

Extracted

Family

darkcomet

Attributes
  • gencode

  • install

    false

  • offline_keylogger

    false

  • persistence

    false

rc4.plain

Targets

    • Target

      JaffaCakes118_2cdfc4b3a08b3113c9e79eb93515b06e

    • Size

      752KB

    • MD5

      2cdfc4b3a08b3113c9e79eb93515b06e

    • SHA1

      c385f64546c66dac6e93f3c8cd734dee8289a276

    • SHA256

      3150800b5673c13bcfa23977cd2dfebccabf45f88a4457f97f389dfc836dccfb

    • SHA512

      dd5696d790fbd2e18207c9dac66deef96244c223df9854f930ebc5d72ec90ee63a8dc3a4e5de7079714127bd9cad21074a3a2a28faccac5c8b084f7b83f986c4

    • SSDEEP

      12288:rDzRWY9Og7jdSR0Do2TO5SetJkqxKvmbXrDQevOKqO/VjpSywbJr:3zRD4R07fcOqxtiOlc1

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Modifies WinLogon for persistence

    • Drops file in Drivers directory

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks