Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    JaffaCakes118_7dc6bfdb54d5e1cdf7208106fe2c2491

  • Size

    716KB

  • Sample

    250317-l5b8xazqw9

  • MD5

    7dc6bfdb54d5e1cdf7208106fe2c2491

  • SHA1

    91262b827d7e60b03d1bd487763fb5849bdab019

  • SHA256

    df3f0e1cbff0df311e1d49f45455c557c1602cff5ed602792477eafff580d139

  • SHA512

    bfb0eaaeb4ca5a10f31eb22b96e8c0ce8a975a006c73dbcfc2a7275323e5065bcc7df9860c43b779a1cfb0649c914ee312528356750c85632aadcaba79c6313f

  • SSDEEP

    12288:lcOl59OsbsNOssoSTlDf1dFJ/gvhPcyQ1dgrQGFjC1C:lll5xsNJoj1d34pHQnQQOjEC

Malware Config

Extracted

Family

darkcomet

Attributes
  • gencode

  • install

    false

  • offline_keylogger

    false

  • persistence

    false

rc4.plain

Extracted

Family

darkcomet

Botnet

Guest16

C2

jakeyboy159.no-ip.org:1414

Mutex

DC_MUTEX-BQWSV5E

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    Wb2K7x0aYnY5

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    rundll32

rc4.plain

Targets

    • Target

      JaffaCakes118_7dc6bfdb54d5e1cdf7208106fe2c2491

    • Size

      716KB

    • MD5

      7dc6bfdb54d5e1cdf7208106fe2c2491

    • SHA1

      91262b827d7e60b03d1bd487763fb5849bdab019

    • SHA256

      df3f0e1cbff0df311e1d49f45455c557c1602cff5ed602792477eafff580d139

    • SHA512

      bfb0eaaeb4ca5a10f31eb22b96e8c0ce8a975a006c73dbcfc2a7275323e5065bcc7df9860c43b779a1cfb0649c914ee312528356750c85632aadcaba79c6313f

    • SSDEEP

      12288:lcOl59OsbsNOssoSTlDf1dFJ/gvhPcyQ1dgrQGFjC1C:lll5xsNJoj1d34pHQnQQOjEC

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Modifies WinLogon for persistence

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks