General

  • Target

    JaffaCakes118_4605f0ccc8e9f079c50e5d89025f300e

  • Size

    659KB

  • Sample

    250303-kmxlfstkx2

  • MD5

    4605f0ccc8e9f079c50e5d89025f300e

  • SHA1

    fe1a8a49fd6b2fc08ca8f69f8d21153f3606a7a2

  • SHA256

    910eeeae2af17c6ee8009c60e79059f56b903703733937553384f7e772009177

  • SHA512

    c4e0bd0a641cf42e4949b1fa98f8b8e86a1b3fd45942b75e63621e637992cf36824ef8278ce3b824f17987fb1d339458252b03bbf57bd05ceb716abc2061fc33

  • SSDEEP

    12288:H9AFlAd0Z+89cxTGzO4AucTD8QP2lmFSrVs9LqnKp:dAQ6Zx9cxTmOrucTIEFSpOGk

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

noo-ip.no-ip.biz:1604

Mutex

DC_MUTEX-F54S21D

Attributes
  • InstallPath

    winupdate.exe

  • gencode

    h-*ti+verQk2

  • install

    true

  • offline_keylogger

    false

  • persistence

    false

rc4.plain

Targets

    • Target

      JaffaCakes118_4605f0ccc8e9f079c50e5d89025f300e

    • Size

      659KB

    • MD5

      4605f0ccc8e9f079c50e5d89025f300e

    • SHA1

      fe1a8a49fd6b2fc08ca8f69f8d21153f3606a7a2

    • SHA256

      910eeeae2af17c6ee8009c60e79059f56b903703733937553384f7e772009177

    • SHA512

      c4e0bd0a641cf42e4949b1fa98f8b8e86a1b3fd45942b75e63621e637992cf36824ef8278ce3b824f17987fb1d339458252b03bbf57bd05ceb716abc2061fc33

    • SSDEEP

      12288:H9AFlAd0Z+89cxTGzO4AucTD8QP2lmFSrVs9LqnKp:dAQ6Zx9cxTmOrucTIEFSpOGk

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Modifies WinLogon for persistence

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks