General

  • Target

    JaffaCakes118_9805732917b4f66d8aaa64f4a90f352d

  • Size

    1.1MB

  • Sample

    250329-y7ywxavpt8

  • MD5

    9805732917b4f66d8aaa64f4a90f352d

  • SHA1

    c040a489a44ba1fe1d20ad30033b190703983241

  • SHA256

    e5e69a6982bda014dc72e4f790a2548f6f9f171bd35233c1665447cfcb96b288

  • SHA512

    c474a2826ce77d21116fa86b9211bfed256379ff01ffcc7b33f0645fe618f08ccc7bb3ad93d44cf8bd7c871b948deb3fc948777c48549045e1b76d4011c63643

  • SSDEEP

    24576:7FE//Tct4bOsjItd3vCveCXERUAQJGAuKZLjvBWJVaTE:RSVjIr3vnCXERUZJbuKhjvB2aTE

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

vertexking.no-ip.org:999

Mutex

DC_MUTEX-LQMAH1E

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    5TwUP1XxSqk2

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    MicroUpdate

rc4.plain

Targets

    • Target

      JaffaCakes118_9805732917b4f66d8aaa64f4a90f352d

    • Size

      1.1MB

    • MD5

      9805732917b4f66d8aaa64f4a90f352d

    • SHA1

      c040a489a44ba1fe1d20ad30033b190703983241

    • SHA256

      e5e69a6982bda014dc72e4f790a2548f6f9f171bd35233c1665447cfcb96b288

    • SHA512

      c474a2826ce77d21116fa86b9211bfed256379ff01ffcc7b33f0645fe618f08ccc7bb3ad93d44cf8bd7c871b948deb3fc948777c48549045e1b76d4011c63643

    • SSDEEP

      24576:7FE//Tct4bOsjItd3vCveCXERUAQJGAuKZLjvBWJVaTE:RSVjIr3vnCXERUZJbuKhjvB2aTE

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Modifies WinLogon for persistence

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks