General

  • Target

    JaffaCakes118_4989fcdd0fbffd07c5c1586c5340a30e

  • Size

    1.3MB

  • Sample

    250303-2jed5s1zez

  • MD5

    4989fcdd0fbffd07c5c1586c5340a30e

  • SHA1

    4d7929fc4c78f08f2f08be1a01d6530ebde45568

  • SHA256

    cb01297ffc07f7264bf275ebb1fd44a6314381787fa965b4aeb7c6b796aa0342

  • SHA512

    5376f44162c15f36ea785e7a7b92ff93e4f20c2839fe76d46014651517e7e5b4413c1fda5159e3e3fbcf98f69d912d39abe0e72c97496a66c4617364f4d61a2d

  • SSDEEP

    12288:9Ym+qrJn9HTSGQ3+PLjZmdcbMV8ii6nHx+n/kmC7gr8cI4dLfMY+eTFXfliwhTX4:Uqm4H9pcDGtI4B4qfogKcUY9Kl8AC

Malware Config

Extracted

Family

darkcomet

Botnet

Test_bot1

C2

sabsync.sytes.net:9594

Mutex

DC_MUTEX-13FB4FF

Attributes
  • InstallPath

    winlogon.exe

  • gencode

    f0QC-9o-bw26

  • install

    true

  • offline_keylogger

    true

  • password

    gta99

  • persistence

    true

  • reg_key

    winlogon

rc4.plain

Extracted

Family

darkcomet

Attributes
  • gencode

  • install

    false

  • offline_keylogger

    false

  • persistence

    false

rc4.plain

Targets

    • Target

      JaffaCakes118_4989fcdd0fbffd07c5c1586c5340a30e

    • Size

      1.3MB

    • MD5

      4989fcdd0fbffd07c5c1586c5340a30e

    • SHA1

      4d7929fc4c78f08f2f08be1a01d6530ebde45568

    • SHA256

      cb01297ffc07f7264bf275ebb1fd44a6314381787fa965b4aeb7c6b796aa0342

    • SHA512

      5376f44162c15f36ea785e7a7b92ff93e4f20c2839fe76d46014651517e7e5b4413c1fda5159e3e3fbcf98f69d912d39abe0e72c97496a66c4617364f4d61a2d

    • SSDEEP

      12288:9Ym+qrJn9HTSGQ3+PLjZmdcbMV8ii6nHx+n/kmC7gr8cI4dLfMY+eTFXfliwhTX4:Uqm4H9pcDGtI4B4qfogKcUY9Kl8AC

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Modifies WinLogon for persistence

    • Disables RegEdit via registry modification

    • Modifies Windows Firewall

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks