General

  • Target

    JaffaCakes118_b6a36a6ffa1364de26b7687312b3591a

  • Size

    560KB

  • Sample

    250414-fd7ylsyqz9

  • MD5

    b6a36a6ffa1364de26b7687312b3591a

  • SHA1

    01bd3f5ab08674fb2e5976eb3535c8eb89a52a22

  • SHA256

    3af9c2594cfbde7fbd180c37be3f4444274c785f16a82564bd37aa275a649b98

  • SHA512

    f2362ec3ce599fdbd3d7a366c2d36512147e9a879c631fd5adfa349a80ba5cf71f4d3edfe2c481f4573615fc86af5a3c442f3c0f8adb191e4f4faaf5e4cc4694

  • SSDEEP

    12288:v6Wq4aaE6KwyF5L0Y2D1PqL8KAuU50ico0w5KJV7g:tthEVaPqLNUjn5KJu

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

dc1604.no-ip.org:1604

Mutex

DC_MUTEX-JXX3KY6

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    NR5NBa7Z8U9b

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    WinUpdate

rc4.plain

Targets

    • Target

      JaffaCakes118_b6a36a6ffa1364de26b7687312b3591a

    • Size

      560KB

    • MD5

      b6a36a6ffa1364de26b7687312b3591a

    • SHA1

      01bd3f5ab08674fb2e5976eb3535c8eb89a52a22

    • SHA256

      3af9c2594cfbde7fbd180c37be3f4444274c785f16a82564bd37aa275a649b98

    • SHA512

      f2362ec3ce599fdbd3d7a366c2d36512147e9a879c631fd5adfa349a80ba5cf71f4d3edfe2c481f4573615fc86af5a3c442f3c0f8adb191e4f4faaf5e4cc4694

    • SSDEEP

      12288:v6Wq4aaE6KwyF5L0Y2D1PqL8KAuU50ico0w5KJV7g:tthEVaPqLNUjn5KJu

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Modifies WinLogon for persistence

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v16

Tasks