General

  • Target

    JaffaCakes118_96a686bb248a355f9a720d9bf61ef064

  • Size

    944KB

  • Sample

    250329-yqhtcszqv4

  • MD5

    96a686bb248a355f9a720d9bf61ef064

  • SHA1

    b2a5177dfcdaa530c80f90f941de179ee2fb7b13

  • SHA256

    6738adf5533e75a138acd4a3529e06c684358e6357ed35032e2754f410bcb0fd

  • SHA512

    9f620190913834951e0374975554d15d00b596c15a9580fd81ad3301b76ba9387ceca3a7d261436d47178f848432a5e612584ab2f20a4d9aa4035f73ac0509a2

  • SSDEEP

    24576:hI1FoXBnpw8bzRhObDkvEbSDKC2UmKaHZfKYYPi:hMYBny0zD0DkvG8mKQCYY6

Malware Config

Extracted

Family

darkcomet

Attributes
  • gencode

  • install

    false

  • offline_keylogger

    false

  • persistence

    false

rc4.plain

Extracted

Family

darkcomet

Botnet

Guest16

C2

rawezhhacker.no-ip.org:1604

Mutex

DC_MUTEX-X873AH0

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    XcXCPdfMkCy9

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

rc4.plain

Targets

    • Target

      JaffaCakes118_96a686bb248a355f9a720d9bf61ef064

    • Size

      944KB

    • MD5

      96a686bb248a355f9a720d9bf61ef064

    • SHA1

      b2a5177dfcdaa530c80f90f941de179ee2fb7b13

    • SHA256

      6738adf5533e75a138acd4a3529e06c684358e6357ed35032e2754f410bcb0fd

    • SHA512

      9f620190913834951e0374975554d15d00b596c15a9580fd81ad3301b76ba9387ceca3a7d261436d47178f848432a5e612584ab2f20a4d9aa4035f73ac0509a2

    • SSDEEP

      24576:hI1FoXBnpw8bzRhObDkvEbSDKC2UmKaHZfKYYPi:hMYBny0zD0DkvG8mKQCYY6

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Modifies WinLogon for persistence

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks