General

  • Target

    JaffaCakes118_8c55832a94ce16e0c6ec6a0bf9895784

  • Size

    1.2MB

  • Sample

    250329-vrj62a1ya1

  • MD5

    8c55832a94ce16e0c6ec6a0bf9895784

  • SHA1

    bb2313ac8f07cafa0cf82379237a5dfcd66f7118

  • SHA256

    01729c97c10457d709e4b9669a624db609e82ff20b65942b99bd814f14bfe536

  • SHA512

    afe0bf6dd4571e1809d0f5df1138c1d26307ca65ee748abccb854d50a7046814dcd71869a7519277857a66e484eeaf3e65f6a4507d4d3b500e17f770563837c0

  • SSDEEP

    24576:AyFNA6AIKHdtTwNyMXOqaUicC9AnwAK7CTJKwjI+:TTySWWjI+

Malware Config

Extracted

Family

darkcomet

Botnet

fvictim

C2

mranarchist11.zapto.org:1604

Mutex

DC_MUTEX-V90U3RC

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    YQruLKBbNyup

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    GoogleUpdate

rc4.plain

Extracted

Family

latentbot

C2

mranarchist11.zapto.org

Targets

    • Target

      JaffaCakes118_8c55832a94ce16e0c6ec6a0bf9895784

    • Size

      1.2MB

    • MD5

      8c55832a94ce16e0c6ec6a0bf9895784

    • SHA1

      bb2313ac8f07cafa0cf82379237a5dfcd66f7118

    • SHA256

      01729c97c10457d709e4b9669a624db609e82ff20b65942b99bd814f14bfe536

    • SHA512

      afe0bf6dd4571e1809d0f5df1138c1d26307ca65ee748abccb854d50a7046814dcd71869a7519277857a66e484eeaf3e65f6a4507d4d3b500e17f770563837c0

    • SSDEEP

      24576:AyFNA6AIKHdtTwNyMXOqaUicC9AnwAK7CTJKwjI+:TTySWWjI+

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • LatentBot

      Modular trojan written in Delphi which has been in-the-wild since 2013.

    • Latentbot family

    • Modifies WinLogon for persistence

    • Modifies firewall policy service

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Drops file in Drivers directory

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Uses the VBS compiler for execution

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks