General

  • Target

    JaffaCakes118_895cc284825810712eb7a85b28533cca

  • Size

    392KB

  • Sample

    250326-3dhp2swr12

  • MD5

    895cc284825810712eb7a85b28533cca

  • SHA1

    48e818ba3f6002a4f1ef086b561df40dea4f2b78

  • SHA256

    0d162cd950a2dd847ba0def915e1b77e71fcb42ee7ccfc1c442d8c9c59856c86

  • SHA512

    c20050ac01816304b3efede26b63af5087608755275cad06becbd2ff26330bccafe95678f8ad9dfcec268482ad5ff33f55a4294fae44898d0f867387eb40135d

  • SSDEEP

    12288:7dxeU2Gq3B1OArDJOTC2qaKG46r47LUL3LvBeFt:7G3B1Hr8TKaB4k47LUnvBA

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

edmosby.no-ip.org:1604

Mutex

DC_MUTEX-0V1ZN3L

Attributes
  • gencode

    K.jmGidi=Rj5

  • install

    false

  • offline_keylogger

    true

  • persistence

    false

rc4.plain

Targets

    • Target

      JaffaCakes118_895cc284825810712eb7a85b28533cca

    • Size

      392KB

    • MD5

      895cc284825810712eb7a85b28533cca

    • SHA1

      48e818ba3f6002a4f1ef086b561df40dea4f2b78

    • SHA256

      0d162cd950a2dd847ba0def915e1b77e71fcb42ee7ccfc1c442d8c9c59856c86

    • SHA512

      c20050ac01816304b3efede26b63af5087608755275cad06becbd2ff26330bccafe95678f8ad9dfcec268482ad5ff33f55a4294fae44898d0f867387eb40135d

    • SSDEEP

      12288:7dxeU2Gq3B1OArDJOTC2qaKG46r47LUL3LvBeFt:7G3B1Hr8TKaB4k47LUnvBA

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Windows security bypass

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Windows security modification

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks