General
-
Target
JaffaCakes118_4f1967f6bdd7148ed00e496a9bcaa88f
-
Size
461KB
-
Sample
250304-xpd84sykv9
-
MD5
4f1967f6bdd7148ed00e496a9bcaa88f
-
SHA1
03b5957933f4a23379bace705a2e971c08a14685
-
SHA256
a4e92f82f92ac626b5ffd151e2a16bdf90083242a42c37f2c58683a94f663570
-
SHA512
a9431a11a62032711dfe00d4d141219d46a72db513981f80f3bd60f82dbd199ed1afcbc31ea87ea01d8338941a9b4150cbb5e86359abe26d3989bf744443026f
-
SSDEEP
12288:hOZJHdwsdggqfiOV7YT1UW5joGqZ8ID99eg5+eT1:cL9pWZHyTF5cF3Db5T
Static task
static1
Behavioral task
behavioral1
Sample
FakeWebcam6.2.exe
Resource
win7-20240729-en
Malware Config
Extracted
darkcomet
Hacked
kingkingofhacker.no-ip.biz:1604
DC_MUTEX-XYZSRMS
-
InstallPath
FakeWebcam.exe
-
gencode
DNUieDl1NhPQ
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
MicroUpdate
Targets
-
-
Target
FakeWebcam6.2.exe
-
Size
632KB
-
MD5
85ea1c7e59b63c1731d642e576b8d5bd
-
SHA1
44ffbcbe5bed1be774c97f24a60a70186e525510
-
SHA256
8d18c9599f3f743b6f3abb2d20887ab1f4178e53cd2948cd226d2f189dd65804
-
SHA512
1ce0cfd5ee9eaa2b272eb240a06c01ae79e6a5650646c73dff2c7bc4227ca4fbad623afccd521dab8d97f4cdb5fd47ff671cfe6f386a46964491f20cf867d96b
-
SSDEEP
12288:6Gfkwc4ybTNaaaqvE9mJknkSD9MfsTXbsO4uaFNHRLIEvXU195:NMwVW2kHxw
-
Darkcomet family
-
Modifies WinLogon for persistence
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1