General

  • Target

    JaffaCakes118_bd13e46b816b8e46527a64a35b32882f

  • Size

    2.4MB

  • Sample

    250418-h193lawyc1

  • MD5

    bd13e46b816b8e46527a64a35b32882f

  • SHA1

    3e85ff50d2059b2ff2292fe2a0d1eceab0e71fcd

  • SHA256

    ddf83a8699f5db890b48d3b29b43fc6d39f32307cd091cad965e24011d49f01a

  • SHA512

    2ce91782f7137655567a4c9262795d6b659ae505cb5d054d9d32df0920c0607376ba15871205a4b364d64f5443226277d654ffb93ba5353005b59e0246f2b2d0

  • SSDEEP

    24576:JM3rm7OeLqMWwmQZ9sgAZioPaWW7Ak1Op+gqYV10:JMPeLqVCU7pqb

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

109.201.165.20:1604

Mutex

DC_MUTEX-QX9XR2U

Attributes
  • gencode

    q-B9XY.uACb2

  • install

    false

  • offline_keylogger

    false

  • persistence

    false

rc4.plain

Extracted

Family

darkcomet

Attributes
  • gencode

  • install

    false

  • offline_keylogger

    false

  • persistence

    false

rc4.plain

Targets

    • Target

      JaffaCakes118_bd13e46b816b8e46527a64a35b32882f

    • Size

      2.4MB

    • MD5

      bd13e46b816b8e46527a64a35b32882f

    • SHA1

      3e85ff50d2059b2ff2292fe2a0d1eceab0e71fcd

    • SHA256

      ddf83a8699f5db890b48d3b29b43fc6d39f32307cd091cad965e24011d49f01a

    • SHA512

      2ce91782f7137655567a4c9262795d6b659ae505cb5d054d9d32df0920c0607376ba15871205a4b364d64f5443226277d654ffb93ba5353005b59e0246f2b2d0

    • SSDEEP

      24576:JM3rm7OeLqMWwmQZ9sgAZioPaWW7Ak1Op+gqYV10:JMPeLqVCU7pqb

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v16

Tasks