General
-
Target
JaffaCakes118_b3796be671bdb27583408204fcc64ca9
-
Size
756KB
-
Sample
250413-efvkmayvbt
-
MD5
b3796be671bdb27583408204fcc64ca9
-
SHA1
3720f0398e79ec2fd4de48e2e3559cc15011f6c3
-
SHA256
28d3e3b555b6917f2e209ad2a5be9629054f8f46bb47efb82a5608ecfe0941b0
-
SHA512
0c161afd679767a3b841a1c01cc14b3778c90239c68410a95678d245fb484c8e986f9279465adfbf5b93df2c59f5bca04e18ba324dd86aa49df2353cb2b9281a
-
SSDEEP
12288:w/koR37v9WY0sMW65UZexZ8+UqyL1nXPKIjTmI9BVvZq7SZqOWdMDjalS:2kolB/45UZEGqyL1n/KvQrq7hOWdMDjR
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_b3796be671bdb27583408204fcc64ca9.exe
Resource
win10v2004-20250410-en
Malware Config
Extracted
darkcomet
Guest16
hotomansito.no-ip.biz:8080
DC_MUTEX-1NY35UQ
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
rdp5jZ7wlFBi
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
MicroUpdate
Targets
-
-
Target
JaffaCakes118_b3796be671bdb27583408204fcc64ca9
-
Size
756KB
-
MD5
b3796be671bdb27583408204fcc64ca9
-
SHA1
3720f0398e79ec2fd4de48e2e3559cc15011f6c3
-
SHA256
28d3e3b555b6917f2e209ad2a5be9629054f8f46bb47efb82a5608ecfe0941b0
-
SHA512
0c161afd679767a3b841a1c01cc14b3778c90239c68410a95678d245fb484c8e986f9279465adfbf5b93df2c59f5bca04e18ba324dd86aa49df2353cb2b9281a
-
SSDEEP
12288:w/koR37v9WY0sMW65UZexZ8+UqyL1nXPKIjTmI9BVvZq7SZqOWdMDjalS:2kolB/45UZEGqyL1n/KvQrq7hOWdMDjR
-
Darkcomet family
-
Modifies WinLogon for persistence
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v16
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
2