General

  • Target

    JaffaCakes118_37d8afda879e0fc483b5fe79cab356cd

  • Size

    684KB

  • Sample

    250301-kavlbswsby

  • MD5

    37d8afda879e0fc483b5fe79cab356cd

  • SHA1

    7b08e74bef1c00cda3f1334bb286fe924b0d62d9

  • SHA256

    1deb2aa775db7e51667ac2a20c19d55ecff57d2099c15c30f3d6a700da91c536

  • SHA512

    e657dd3a01c05c58719fa2aba0f2a9a6044c904709e04bc31ee1f18841c1dd09f406c272bc9c3d283e8c129fbdba62340d5b6d7a2964c0f74bc7eeb68e29f88f

  • SSDEEP

    12288:KNtmTBzVBrA6ogaySz18qvfesLWjJD22UlTt5suYvjrwN0lAkMFR91OXkH+D:KyVBEpNySKqusiJ6TbsuY7EN0yJFT1cL

Malware Config

Extracted

Family

darkcomet

Attributes
  • gencode

  • install

    false

  • offline_keylogger

    false

  • persistence

    false

rc4.plain

Extracted

Family

darkcomet

Botnet

New---Victim

C2

zungazungazz.zapto.org:1604

Mutex

DC_MUTEX-HT5SE3B

Attributes
  • gencode

    vEKa4EfVhWYn

  • install

    false

  • offline_keylogger

    true

  • persistence

    false

rc4.plain

Extracted

Family

latentbot

C2

zungazungazz.zapto.org

Targets

    • Target

      JaffaCakes118_37d8afda879e0fc483b5fe79cab356cd

    • Size

      684KB

    • MD5

      37d8afda879e0fc483b5fe79cab356cd

    • SHA1

      7b08e74bef1c00cda3f1334bb286fe924b0d62d9

    • SHA256

      1deb2aa775db7e51667ac2a20c19d55ecff57d2099c15c30f3d6a700da91c536

    • SHA512

      e657dd3a01c05c58719fa2aba0f2a9a6044c904709e04bc31ee1f18841c1dd09f406c272bc9c3d283e8c129fbdba62340d5b6d7a2964c0f74bc7eeb68e29f88f

    • SSDEEP

      12288:KNtmTBzVBrA6ogaySz18qvfesLWjJD22UlTt5suYvjrwN0lAkMFR91OXkH+D:KyVBEpNySKqusiJ6TbsuY7EN0yJFT1cL

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • LatentBot

      Modular trojan written in Delphi which has been in-the-wild since 2013.

    • Latentbot family

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks