General
-
Target
JaffaCakes118_36a2e0b03acc09b7d7bde9ecbc29884a
-
Size
830KB
-
Sample
250301-eqzbkazq13
-
MD5
36a2e0b03acc09b7d7bde9ecbc29884a
-
SHA1
f7fb16c7db12ab0f459c1d257bd8633971ac4ec2
-
SHA256
7ebbc6ba5361d4824e880c9dd7196066b480555d731fb10f9c90a7060eb8808c
-
SHA512
83c5e1c667bba2699c05efd9f23d5201859d6b79f55b2ade025de5831e36eff15cd8bf4278329c8011d6a7d40fd82b013da97a8406dc6420e0718a9c0f9b48f5
-
SSDEEP
12288:hAWFyFMup2DnS6VrFYj7fjYDl0d6KxDTe4eHfIWM9HjbuW/7fPHZOem:CIuMk2DnS6VrQ2gDTrebM9HjV/bPHlm
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_36a2e0b03acc09b7d7bde9ecbc29884a.exe
Resource
win7-20240903-en
Malware Config
Extracted
darkcomet
victima
testers28.no-ip.org:1111
DC_MUTEX-1GF3HUC
-
InstallPath
JavaRE\bin\Java.exe
-
gencode
CiJev6UZ6jH*
-
install
true
-
offline_keylogger
true
-
password
1234
-
persistence
false
-
reg_key
Java
Targets
-
-
Target
JaffaCakes118_36a2e0b03acc09b7d7bde9ecbc29884a
-
Size
830KB
-
MD5
36a2e0b03acc09b7d7bde9ecbc29884a
-
SHA1
f7fb16c7db12ab0f459c1d257bd8633971ac4ec2
-
SHA256
7ebbc6ba5361d4824e880c9dd7196066b480555d731fb10f9c90a7060eb8808c
-
SHA512
83c5e1c667bba2699c05efd9f23d5201859d6b79f55b2ade025de5831e36eff15cd8bf4278329c8011d6a7d40fd82b013da97a8406dc6420e0718a9c0f9b48f5
-
SSDEEP
12288:hAWFyFMup2DnS6VrFYj7fjYDl0d6KxDTe4eHfIWM9HjbuW/7fPHZOem:CIuMk2DnS6VrQ2gDTrebM9HjV/bPHlm
-
Darkcomet family
-
Modifies WinLogon for persistence
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1