General

  • Target

    JaffaCakes118_bb644d9d074bc7ed49fe48e8da82b40c

  • Size

    722KB

  • Sample

    250417-17xd7awmt5

  • MD5

    bb644d9d074bc7ed49fe48e8da82b40c

  • SHA1

    4a37c9123958c179a6b107571b7468a99c4bbf96

  • SHA256

    243742280dab2a4f0cb78465e95d53009b4f3f942a88e87d7c08471407565f42

  • SHA512

    c7189f330b32c3a562ed0cc4cc694387336431d409692ecad78dd8e20e2eb6344c31eaaf319487b0237fe445db13baac0a237c31d999740ae7abb66f23206a3b

  • SSDEEP

    12288:jrwYAI1xDr3gPVFoSXfKyOEN2mYmlQ0KKe5aHWkEBobJaOYs+C9jZKOQk8Ndd9l:4Nk9rwPVF9KyOEgTmBe5rBoqsxlZW

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16_min

C2

127.0.0.1:1604

Mutex

DCMIN_MUTEX-J3AF8JW

Attributes
  • InstallPath

    DCSCMIN\IMDCSC.exe

  • gencode

    twsPYC9MBUcZ

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    DarkComet RAT

rc4.plain

Targets

    • Target

      JaffaCakes118_bb644d9d074bc7ed49fe48e8da82b40c

    • Size

      722KB

    • MD5

      bb644d9d074bc7ed49fe48e8da82b40c

    • SHA1

      4a37c9123958c179a6b107571b7468a99c4bbf96

    • SHA256

      243742280dab2a4f0cb78465e95d53009b4f3f942a88e87d7c08471407565f42

    • SHA512

      c7189f330b32c3a562ed0cc4cc694387336431d409692ecad78dd8e20e2eb6344c31eaaf319487b0237fe445db13baac0a237c31d999740ae7abb66f23206a3b

    • SSDEEP

      12288:jrwYAI1xDr3gPVFoSXfKyOEN2mYmlQ0KKe5aHWkEBobJaOYs+C9jZKOQk8Ndd9l:4Nk9rwPVF9KyOEgTmBe5rBoqsxlZW

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Modifies WinLogon for persistence

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v16

Tasks