Resubmissions

07/03/2025, 19:43

250307-yfp5pavye1 10

07/03/2025, 19:34

250307-x958bswky3 10

07/03/2025, 19:02

250307-xpxqfsvvbv 10

General

  • Target

    JaffaCakes118_58ef8399e896e60b181961292fb6d666

  • Size

    1.2MB

  • Sample

    250307-xpxqfsvvbv

  • MD5

    58ef8399e896e60b181961292fb6d666

  • SHA1

    d5b651f75234877814d8efabb6256fbc23c662ed

  • SHA256

    6deff5735317a9b7addf8d9f8d3aeca1de68364e63b69037b2c916bcaee44003

  • SHA512

    b9c4059148ff6ff96b376b69450a5234b4de8684ef41173601c24140da62a2b623f4117f5f483be478c9542be676cd705511d9540689b247cd44215b8c2f7b37

  • SSDEEP

    24576:D6t9iwCQliK/JJDORRrQl9uM1aIcLkNC2brX5qXI8PP:Wt9iwJTDOPsrNcwNbwxP

Malware Config

Extracted

Family

darkcomet

Botnet

enzcrash

C2

whatthe.no-ip.biz:1604

Mutex

DC_MUTEX-F54S21D

Attributes
  • InstallPath

    winupdate.exe

  • gencode

    =fgh�Num+Xi-

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    Windows Updater

rc4.plain

Extracted

Family

darkcomet

Attributes
  • gencode

  • install

    false

  • offline_keylogger

    false

  • persistence

    false

rc4.plain

Targets

    • Target

      JaffaCakes118_58ef8399e896e60b181961292fb6d666

    • Size

      1.2MB

    • MD5

      58ef8399e896e60b181961292fb6d666

    • SHA1

      d5b651f75234877814d8efabb6256fbc23c662ed

    • SHA256

      6deff5735317a9b7addf8d9f8d3aeca1de68364e63b69037b2c916bcaee44003

    • SHA512

      b9c4059148ff6ff96b376b69450a5234b4de8684ef41173601c24140da62a2b623f4117f5f483be478c9542be676cd705511d9540689b247cd44215b8c2f7b37

    • SSDEEP

      24576:D6t9iwCQliK/JJDORRrQl9uM1aIcLkNC2brX5qXI8PP:Wt9iwJTDOPsrNcwNbwxP

    • Blackshades

      Blackshades is a remote access trojan with various capabilities.

    • Blackshades family

    • Blackshades payload

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • HawkEye

      HawkEye is a malware kit that has seen continuous development since at least 2013.

    • Hawkeye family

    • Modifies WinLogon for persistence

    • Modifies firewall policy service

    • Modifies security service

    • Windows security bypass

    • Adds policy Run key to start application

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks