General

  • Target

    JaffaCakes118_94ae148b52780af54b723b5380185d99

  • Size

    857KB

  • Sample

    250329-x5r5xa1yew

  • MD5

    94ae148b52780af54b723b5380185d99

  • SHA1

    6872f2768367b08e8c26366107c19e1ca5c11266

  • SHA256

    221d7b0e44cc74e33876860dca9b56cb50cedc1af8d356de56c260edeeddcb0b

  • SHA512

    7c36bfe04dbd25891518f647e25231f4b67185f11e40c96abc1a15c83660e7d10243b92219f4979c68f013d902244131e07bd0e2a4a762024d4df9e54c605ad2

  • SSDEEP

    24576:rWRO8WSDj8LNJQQoxjOPz0Q+1XBLQnUNOdYQ/:P8WFLboEPAQ+1RLQUNO7/

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

birouamar.no-ip.biz:1604

Mutex

DC_MUTEX-3QX5DND

Attributes
  • InstallPath

    Windupdt\winupdate.exe

  • gencode

    *RzE6rBHtDLe

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    winupdater

rc4.plain

Targets

    • Target

      Cristina Ciobanasu - CanCan.exe

    • Size

      890KB

    • MD5

      7a847d1b1823024af6f4f04b5441ba65

    • SHA1

      a960a6ea47ca77470bcbf151fb31c710172bd398

    • SHA256

      cbac4ce9a4e14130e1c21922b079514c8b634375034271c111050f2f376e6ca9

    • SHA512

      3d1842a3390464290b6d23746f249fb75af8ee4b3fd2493a392aa60acc2bee2aacc6dd3082eb3734b377a51eb4c81c5b0b2de800ac47c16e91dddf2317687e7d

    • SSDEEP

      24576:1cWKsMFPW9EJyk9WQG9UlswFCWvvMtkniO:1cWKZey3WSlswFrE6n

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Modifies WinLogon for persistence

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks