General

  • Target

    JaffaCakes118_2d267f4e282ea7e2160701752190d17f

  • Size

    1.0MB

  • Sample

    250227-pdcbdaxns9

  • MD5

    2d267f4e282ea7e2160701752190d17f

  • SHA1

    ef95d3c4c618963b206a1fe08b2df37b115aebef

  • SHA256

    590df4b2c85d04c69c2919ad8b447a4778ddb34d80bee862da41188214d1d80f

  • SHA512

    f5f8ed73ee3b9f9620aa625f2d6276cd9b8610b8a2be0a59e10adba0f3d38b3d02682f5ff7fc37c85f834e656f6a2606353b46d180196d1a3040e621bf53dee3

  • SSDEEP

    12288:gH1P2w6SZivG9MA7VdielJ/qCxnWlozgDEQMjJVnbVU4klF7PwBA3rVmgj5ln/FK:gH1PF64OAprnIDERjJV6rplLrHbBfRM

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

hellblazer123.no-ip.org:1604

Mutex

DC_MUTEX-7PQLMC0

Attributes
  • InstallPath

    Windupdt\winupdate.exe

  • gencode

    ko�Y.6c=axn�

  • install

    true

  • offline_keylogger

    true

  • password

    0126789

  • persistence

    true

  • reg_key

    winupdater

rc4.plain

Targets

    • Target

      JaffaCakes118_2d267f4e282ea7e2160701752190d17f

    • Size

      1.0MB

    • MD5

      2d267f4e282ea7e2160701752190d17f

    • SHA1

      ef95d3c4c618963b206a1fe08b2df37b115aebef

    • SHA256

      590df4b2c85d04c69c2919ad8b447a4778ddb34d80bee862da41188214d1d80f

    • SHA512

      f5f8ed73ee3b9f9620aa625f2d6276cd9b8610b8a2be0a59e10adba0f3d38b3d02682f5ff7fc37c85f834e656f6a2606353b46d180196d1a3040e621bf53dee3

    • SSDEEP

      12288:gH1P2w6SZivG9MA7VdielJ/qCxnWlozgDEQMjJVnbVU4klF7PwBA3rVmgj5ln/FK:gH1PF64OAprnIDERjJV6rplLrHbBfRM

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Modifies WinLogon for persistence

    • Modifies security service

    • Windows security bypass

    • Disables Task Manager via registry modification

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks