General
-
Target
JaffaCakes118_b09dd96c8fd3285ecbf79457eac1dd5d
-
Size
900KB
-
Sample
250412-bj6khstvgx
-
MD5
b09dd96c8fd3285ecbf79457eac1dd5d
-
SHA1
3c1684d18e5bcf062fa7b2ae8bc1ae1b735298e0
-
SHA256
313647849f5f7c41371e99976f1c2e0a60e2cf3e6f7b8b916b46ef38b3e173c7
-
SHA512
3e2070ebd197fca4f4da7f3597afe8949cf1765358cef7074837756041b2970339446b2ec0b86350ec18d03a53a7f53b84500625e856f810853b9779c960aaf5
-
SSDEEP
12288:HX5XfC/zm7TYoBSZPEJMtg7MjX/s5hkcnDVg2cSx/cP+sl5ZAwxaNa3PnGVm54:Hk/aBSBEJMG7JwgD2NiG5n3vO
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_b09dd96c8fd3285ecbf79457eac1dd5d.exe
Resource
win10v2004-20250410-en
Malware Config
Extracted
darkcomet
Guest16
opiate.zapto.org:1984
DC_MUTEX-N00F7NG
-
gencode
pM9ElB*F%/MM
-
install
false
-
offline_keylogger
false
-
persistence
false
Targets
-
-
Target
JaffaCakes118_b09dd96c8fd3285ecbf79457eac1dd5d
-
Size
900KB
-
MD5
b09dd96c8fd3285ecbf79457eac1dd5d
-
SHA1
3c1684d18e5bcf062fa7b2ae8bc1ae1b735298e0
-
SHA256
313647849f5f7c41371e99976f1c2e0a60e2cf3e6f7b8b916b46ef38b3e173c7
-
SHA512
3e2070ebd197fca4f4da7f3597afe8949cf1765358cef7074837756041b2970339446b2ec0b86350ec18d03a53a7f53b84500625e856f810853b9779c960aaf5
-
SSDEEP
12288:HX5XfC/zm7TYoBSZPEJMtg7MjX/s5hkcnDVg2cSx/cP+sl5ZAwxaNa3PnGVm54:Hk/aBSBEJMG7JwgD2NiG5n3vO
-
Darkcomet family
-
Windows security bypass
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-