General

  • Target

    JaffaCakes118_b7bf265c6155ff22a8bef94945a50816

  • Size

    741KB

  • Sample

    250414-pqfvbsxjs3

  • MD5

    b7bf265c6155ff22a8bef94945a50816

  • SHA1

    9a63ca4ab35385d3a0488de697347a9bf8278312

  • SHA256

    0f3093b7e8dc40fe1ceebe0de856af8caebeaf0e08795f49cd0b8c348c2e4bdd

  • SHA512

    41271cfd51c907bb5dfcf8e3dacc62906b6732d780238c113752da060080eab7724fab12bfff4c810bde58be5e20a98a9b2f113125512f3ed2e20e9930931f2d

  • SSDEEP

    12288:VolDRSxTL03zhNjwuOBdlxHHmEDnfAk3Fo90vVOH3JNG1BNCh+jrsutt8BwiY:VolDSU3FNc9BdlJm2nfAuu0vVOHGFO+b

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

127.0.0.1:1604

Mutex

DC_MUTEX-F54S21D

Attributes
  • gencode

    uu9UsYzn8T3D

  • install

    false

  • offline_keylogger

    false

  • persistence

    false

rc4.plain

Targets

    • Target

      JaffaCakes118_b7bf265c6155ff22a8bef94945a50816

    • Size

      741KB

    • MD5

      b7bf265c6155ff22a8bef94945a50816

    • SHA1

      9a63ca4ab35385d3a0488de697347a9bf8278312

    • SHA256

      0f3093b7e8dc40fe1ceebe0de856af8caebeaf0e08795f49cd0b8c348c2e4bdd

    • SHA512

      41271cfd51c907bb5dfcf8e3dacc62906b6732d780238c113752da060080eab7724fab12bfff4c810bde58be5e20a98a9b2f113125512f3ed2e20e9930931f2d

    • SSDEEP

      12288:VolDRSxTL03zhNjwuOBdlxHHmEDnfAk3Fo90vVOH3JNG1BNCh+jrsutt8BwiY:VolDSU3FNc9BdlJm2nfAuu0vVOHGFO+b

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v16

Tasks