General
-
Target
JaffaCakes118_ba1a32fd54153aab9179ec37f1967729
-
Size
336KB
-
Sample
250415-vyjh3synx9
-
MD5
ba1a32fd54153aab9179ec37f1967729
-
SHA1
32b716bd80641f6000eb1ee0f167021dd27699d9
-
SHA256
b6dad4fb20fa3016a09a5fb5f8b81be15090ec4c4315ad1c57699bced67e5808
-
SHA512
149fc586ea1e452cba3914503fcbc7e3ca0170425f58be087412fd8a87fbf4bbbe7858ab4f51073c33309e05a9f63aadf90c357fecb894daf9a14f99bdad84d0
-
SSDEEP
6144:3QhNn/UqgLbGZJ7nislMrZAckccHg5LCFukA1YnFug0ma+jmvUBE1F/di:3gqunin1ApLApCFp5nF4+je1lM
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_ba1a32fd54153aab9179ec37f1967729.exe
Resource
win10v2004-20250410-en
Malware Config
Extracted
darkcomet
Guest1
cantaprova1.no-ip.biz:1604
DC_MUTEX-ZDTZ2AL
-
InstallPath
Windupdt\winupdate.exe
-
gencode
k=s2P0je-Z=n
-
install
true
-
offline_keylogger
true
-
password
123456
-
persistence
true
-
reg_key
winupdater
Targets
-
-
Target
JaffaCakes118_ba1a32fd54153aab9179ec37f1967729
-
Size
336KB
-
MD5
ba1a32fd54153aab9179ec37f1967729
-
SHA1
32b716bd80641f6000eb1ee0f167021dd27699d9
-
SHA256
b6dad4fb20fa3016a09a5fb5f8b81be15090ec4c4315ad1c57699bced67e5808
-
SHA512
149fc586ea1e452cba3914503fcbc7e3ca0170425f58be087412fd8a87fbf4bbbe7858ab4f51073c33309e05a9f63aadf90c357fecb894daf9a14f99bdad84d0
-
SSDEEP
6144:3QhNn/UqgLbGZJ7nislMrZAckccHg5LCFukA1YnFug0ma+jmvUBE1F/di:3gqunin1ApLApCFp5nF4+je1lM
-
Darkcomet family
-
Modifies WinLogon for persistence
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Adds Run key to start application
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v16
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1