General

  • Target

    JaffaCakes118_398cdafaa110b29796ee6cabb7368dbb

  • Size

    1.4MB

  • Sample

    250301-rqzzbatmy6

  • MD5

    398cdafaa110b29796ee6cabb7368dbb

  • SHA1

    074efde68134f0c8823552a72a2f885798f4f9cc

  • SHA256

    5109f48db1772efeb0d95ba5e5a1a5f5331be6aab648726c4b8dd8a368d84058

  • SHA512

    4fcc8d4490c6926797f34e7a6f6eca2c09c403a63e7ee045df41232d7481b6bafa57611280068bc3d7c30b2a444a7d78383fe725cbe5d794f9897613879869cf

  • SSDEEP

    24576:aRmJkcoQricOIQxiZY1ia2z07M/131vs9Dd0uwjR9IRFUofnQV5b4:/JZoQrbTFZY1iaI0U1lvs9DdhsR9PoII

Malware Config

Extracted

Family

darkcomet

Attributes
  • gencode

  • install

    false

  • offline_keylogger

    false

  • persistence

    false

rc4.plain

Extracted

Family

darkcomet

Botnet

ffllasshh

C2

congonicro.no-ip.org:1604

congonicro.no-ip.org:4500

congonicro.no-ip.org:2600

Mutex

DC_MUTEX-14PTXCN

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    jDSGrn6QdmsU

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

rc4.plain

Targets

    • Target

      JaffaCakes118_398cdafaa110b29796ee6cabb7368dbb

    • Size

      1.4MB

    • MD5

      398cdafaa110b29796ee6cabb7368dbb

    • SHA1

      074efde68134f0c8823552a72a2f885798f4f9cc

    • SHA256

      5109f48db1772efeb0d95ba5e5a1a5f5331be6aab648726c4b8dd8a368d84058

    • SHA512

      4fcc8d4490c6926797f34e7a6f6eca2c09c403a63e7ee045df41232d7481b6bafa57611280068bc3d7c30b2a444a7d78383fe725cbe5d794f9897613879869cf

    • SSDEEP

      24576:aRmJkcoQricOIQxiZY1ia2z07M/131vs9Dd0uwjR9IRFUofnQV5b4:/JZoQrbTFZY1iaI0U1lvs9DdhsR9PoII

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Modifies WinLogon for persistence

    • Modifies firewall policy service

    • Modifies security service

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks