General

  • Target

    JaffaCakes118_7cc8c2f33bc298c9f83d2d32742c2018

  • Size

    869KB

  • Sample

    250317-egc2zazsgy

  • MD5

    7cc8c2f33bc298c9f83d2d32742c2018

  • SHA1

    075a07d76f3a4489f5f07a9f724ef230ad249110

  • SHA256

    451a02b69262853fb285e4ce0a07e13cc48a161ef84634ab38f27eef44974ad3

  • SHA512

    56bb6e7a62dc3a1d6bd192d53529f7b620968209b2f9ba8a905deb04f977476ab41285ac25d18a610e11d4b0e2c42151ff94bb75db0e0fe57d43b46d5f57725e

  • SSDEEP

    24576:FNlEmHpqig4M+Ul9EXypsOjPxIQpnG1Pcr6SN74:FNlEmJ0z7lKCpzjuQFG5gLNU

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

dudu2011.no-ip.org:1604

Mutex

DC_MUTEX-F54S21D

Attributes
  • InstallPath

    Windupdt\winupdate.exe

  • gencode

    a5KD-sAPLHGv

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    winupdater

rc4.plain

Targets

    • Target

      JaffaCakes118_7cc8c2f33bc298c9f83d2d32742c2018

    • Size

      869KB

    • MD5

      7cc8c2f33bc298c9f83d2d32742c2018

    • SHA1

      075a07d76f3a4489f5f07a9f724ef230ad249110

    • SHA256

      451a02b69262853fb285e4ce0a07e13cc48a161ef84634ab38f27eef44974ad3

    • SHA512

      56bb6e7a62dc3a1d6bd192d53529f7b620968209b2f9ba8a905deb04f977476ab41285ac25d18a610e11d4b0e2c42151ff94bb75db0e0fe57d43b46d5f57725e

    • SSDEEP

      24576:FNlEmHpqig4M+Ul9EXypsOjPxIQpnG1Pcr6SN74:FNlEmJ0z7lKCpzjuQFG5gLNU

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Modifies WinLogon for persistence

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks