General
-
Target
JaffaCakes118_b43ba85a03bf4335d1d3909c8efa173a
-
Size
1.2MB
-
Sample
250413-ljpxwatsez
-
MD5
b43ba85a03bf4335d1d3909c8efa173a
-
SHA1
dfa4d47a3adf9327b7a7bc31218a2b71cb1dcc5d
-
SHA256
bf9e49eaecc0dd3028a01ed883419c9c939f9f2e63f94453b7dd4829f7d95e66
-
SHA512
ee27aa6899dcafbc4498cda3daa415338c5261e353ae67c1083e37356ff1735e6bca41818cf1a5fbba05867168cd92876da43a17d5197c02a48baaad255db296
-
SSDEEP
24576:LESXV0YFkxerjdJ6dqOuSxqMuv4ktUIvTfZbnDfS0mTBypPEIRDL:BF0Y6xerjLUqMqz16kx3K0mTBypcSD
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_b43ba85a03bf4335d1d3909c8efa173a.exe
Resource
win10v2004-20250410-en
Malware Config
Extracted
darkcomet
Guest16
hostmee.no-ip.org:1604
DC_MUTEX-3WPRR8U
-
gencode
vFVvoYk4wjmc
-
install
false
-
offline_keylogger
true
-
persistence
false
Targets
-
-
Target
JaffaCakes118_b43ba85a03bf4335d1d3909c8efa173a
-
Size
1.2MB
-
MD5
b43ba85a03bf4335d1d3909c8efa173a
-
SHA1
dfa4d47a3adf9327b7a7bc31218a2b71cb1dcc5d
-
SHA256
bf9e49eaecc0dd3028a01ed883419c9c939f9f2e63f94453b7dd4829f7d95e66
-
SHA512
ee27aa6899dcafbc4498cda3daa415338c5261e353ae67c1083e37356ff1735e6bca41818cf1a5fbba05867168cd92876da43a17d5197c02a48baaad255db296
-
SSDEEP
24576:LESXV0YFkxerjdJ6dqOuSxqMuv4ktUIvTfZbnDfS0mTBypPEIRDL:BF0Y6xerjLUqMqz16kx3K0mTBypcSD
-
Darkcomet family
-
Modifies firewall policy service
-
Modifies security service
-
Windows security bypass
-
Executes dropped EXE
-
Windows security modification
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v16
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Defense Evasion
Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
5