General
-
Target
JaffaCakes118_b6a36a6ffa1364de26b7687312b3591a
-
Size
560KB
-
Sample
250414-fd7ylsyqz9
-
MD5
b6a36a6ffa1364de26b7687312b3591a
-
SHA1
01bd3f5ab08674fb2e5976eb3535c8eb89a52a22
-
SHA256
3af9c2594cfbde7fbd180c37be3f4444274c785f16a82564bd37aa275a649b98
-
SHA512
f2362ec3ce599fdbd3d7a366c2d36512147e9a879c631fd5adfa349a80ba5cf71f4d3edfe2c481f4573615fc86af5a3c442f3c0f8adb191e4f4faaf5e4cc4694
-
SSDEEP
12288:v6Wq4aaE6KwyF5L0Y2D1PqL8KAuU50ico0w5KJV7g:tthEVaPqLNUjn5KJu
Malware Config
Extracted
darkcomet
Guest16
dc1604.no-ip.org:1604
DC_MUTEX-JXX3KY6
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
NR5NBa7Z8U9b
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
WinUpdate
Targets
-
-
Target
JaffaCakes118_b6a36a6ffa1364de26b7687312b3591a
-
Size
560KB
-
MD5
b6a36a6ffa1364de26b7687312b3591a
-
SHA1
01bd3f5ab08674fb2e5976eb3535c8eb89a52a22
-
SHA256
3af9c2594cfbde7fbd180c37be3f4444274c785f16a82564bd37aa275a649b98
-
SHA512
f2362ec3ce599fdbd3d7a366c2d36512147e9a879c631fd5adfa349a80ba5cf71f4d3edfe2c481f4573615fc86af5a3c442f3c0f8adb191e4f4faaf5e4cc4694
-
SSDEEP
12288:v6Wq4aaE6KwyF5L0Y2D1PqL8KAuU50ico0w5KJV7g:tthEVaPqLNUjn5KJu
-
Darkcomet family
-
Modifies WinLogon for persistence
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v16
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1