General

  • Target

    JaffaCakes118_946e5db1e8972d93ce65765b40c6f4e7

  • Size

    659KB

  • Sample

    250329-x2bnrasqs3

  • MD5

    946e5db1e8972d93ce65765b40c6f4e7

  • SHA1

    2fdb6981ac6702240ec8cbb9d1636175cc34ef73

  • SHA256

    9d572e6a97b418a60cf75f96b0b000338fa82a570848b047c4bea55c2dc2bc23

  • SHA512

    031df0eb1b09218c9118b01b9a4b56f9a80bf9d1a795884ed96a55430532c06743d2bc82d1ceeb894ee10f6c91b153a3a5b13d59a6afb9d7f6d4eb0a35405f10

  • SSDEEP

    12288:C9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/hf:uZ1xuVVjfFoynPaVBUR8f+kN10EB1

Malware Config

Extracted

Family

darkcomet

Botnet

Opfer

C2

anotherlifehack.no-ip.biz:1338

Mutex

DC_MUTEX-XQREXR6

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    ejgqgugTtZBa

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

rc4.plain

Targets

    • Target

      JaffaCakes118_946e5db1e8972d93ce65765b40c6f4e7

    • Size

      659KB

    • MD5

      946e5db1e8972d93ce65765b40c6f4e7

    • SHA1

      2fdb6981ac6702240ec8cbb9d1636175cc34ef73

    • SHA256

      9d572e6a97b418a60cf75f96b0b000338fa82a570848b047c4bea55c2dc2bc23

    • SHA512

      031df0eb1b09218c9118b01b9a4b56f9a80bf9d1a795884ed96a55430532c06743d2bc82d1ceeb894ee10f6c91b153a3a5b13d59a6afb9d7f6d4eb0a35405f10

    • SSDEEP

      12288:C9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/hf:uZ1xuVVjfFoynPaVBUR8f+kN10EB1

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Modifies WinLogon for persistence

    • Modifies firewall policy service

    • Modifies security service

    • Windows security bypass

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks