General

  • Target

    JaffaCakes118_8ad729b2555724910616233931ad7949

  • Size

    1.0MB

  • Sample

    250328-t4y1aayves

  • MD5

    8ad729b2555724910616233931ad7949

  • SHA1

    1e324fbe98fedf92c459e74675cfccd943a95f32

  • SHA256

    1c51fa06439b97b06dd793b6ffa378672233047008f7a92b75b85a4dbf7d1c64

  • SHA512

    3078a06641cd0e1b954d4105da844d3158010c077ed31a820945e0d1d1cf0e4afd7ebe5842187204532107a5ead7811f71abcc37fec18efb0c86f94a15cfbfed

  • SSDEEP

    12288:uYpo/eUYOI4L2aZHZp7Ol8Oi1KxVwWnN1L2wvFt4MQzQ4WD9isjgk0cE3ZjpTANS:LK20R/A4m97sxgUdz3pZzfBpQyp5mi

Malware Config

Extracted

Family

darkcomet

Botnet

Infected

C2

486.no-ip.info:3070

Mutex

DC_MUTEX-9366JHV

Attributes
  • InstallPath

    Winupd\winupd.exe

  • gencode

    g�9XqzgXExMy

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    windows Update

rc4.plain

Extracted

Family

darkcomet

Attributes
  • gencode

  • install

    false

  • offline_keylogger

    false

  • persistence

    false

rc4.plain

Targets

    • Target

      JaffaCakes118_8ad729b2555724910616233931ad7949

    • Size

      1.0MB

    • MD5

      8ad729b2555724910616233931ad7949

    • SHA1

      1e324fbe98fedf92c459e74675cfccd943a95f32

    • SHA256

      1c51fa06439b97b06dd793b6ffa378672233047008f7a92b75b85a4dbf7d1c64

    • SHA512

      3078a06641cd0e1b954d4105da844d3158010c077ed31a820945e0d1d1cf0e4afd7ebe5842187204532107a5ead7811f71abcc37fec18efb0c86f94a15cfbfed

    • SSDEEP

      12288:uYpo/eUYOI4L2aZHZp7Ol8Oi1KxVwWnN1L2wvFt4MQzQ4WD9isjgk0cE3ZjpTANS:LK20R/A4m97sxgUdz3pZzfBpQyp5mi

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Modifies WinLogon for persistence

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks