General
-
Target
JaffaCakes118_bea31be31b89909987683c88643b502d
-
Size
723KB
-
Sample
250418-srpemsw1az
-
MD5
bea31be31b89909987683c88643b502d
-
SHA1
165c1b997918cd504e9f92a28e2c45a0cea55c29
-
SHA256
bd76dfec25932ec66a7a479c7f595eeb5b46d9dbc0a737c569c404cde5f399a4
-
SHA512
f408520f56f8a9a871d6e4790290c14abc61fd6c4f16823cc138586ed8c2a42115248ef65dd4d168e7330cf114d81eb66ac30aa4f6becf05871877c2f4e58cb3
-
SSDEEP
12288:gFLlJnnbWOtz6sVJhvaz1Qc/WdI//vfM4qwrbkniafLo6vUTyl0w/q9jJy:Q3nbWmJVJFwSddIXvfhqbiaxvRxq9I
Behavioral task
behavioral1
Sample
JaffaCakes118_bea31be31b89909987683c88643b502d.exe
Resource
win10v2004-20250410-en
Malware Config
Extracted
darkcomet
Guest16
molest.bounceme.net:700
DC_MUTEX-F54S21D
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
JlZ9il58mTDg
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
MicroUpdate
Targets
-
-
Target
JaffaCakes118_bea31be31b89909987683c88643b502d
-
Size
723KB
-
MD5
bea31be31b89909987683c88643b502d
-
SHA1
165c1b997918cd504e9f92a28e2c45a0cea55c29
-
SHA256
bd76dfec25932ec66a7a479c7f595eeb5b46d9dbc0a737c569c404cde5f399a4
-
SHA512
f408520f56f8a9a871d6e4790290c14abc61fd6c4f16823cc138586ed8c2a42115248ef65dd4d168e7330cf114d81eb66ac30aa4f6becf05871877c2f4e58cb3
-
SSDEEP
12288:gFLlJnnbWOtz6sVJhvaz1Qc/WdI//vfM4qwrbkniafLo6vUTyl0w/q9jJy:Q3nbWmJVJFwSddIXvfhqbiaxvRxq9I
-
Darkcomet family
-
Modifies WinLogon for persistence
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v16
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1