General

  • Target

    JaffaCakes118_c111819eab30850f1a2b0013c13ed599

  • Size

    22.1MB

  • Sample

    250419-d2ynqswkt9

  • MD5

    c111819eab30850f1a2b0013c13ed599

  • SHA1

    ddf9d444ee4914194798a2a6fe6b39795f54eabc

  • SHA256

    6e4c943d59d7c9ae951de1e14f35a47af766be7cb2680b6915ae9713b5eb2887

  • SHA512

    cd5a0902cab21d90aa14e9c344b68cade4710922f8ddd30a8c204bbc941418c8e9ea45a0341dfd0504226b52206e167ae9580d18894517748285c5882a73c37b

  • SSDEEP

    24576:BWc7SR2xuGBRBgOiULNFOAL+ToFZxvYR:BWVR2MrOiUh8LME

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

cr4nk1337.no-ip.org:1337

Mutex

DC_MUTEX-7XE7939

Attributes
  • InstallPath

    Windupdt\winupdate.exe

  • gencode

    9s�5H0iQeqv.

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    winupdater

rc4.plain

Targets

    • Target

      JaffaCakes118_c111819eab30850f1a2b0013c13ed599

    • Size

      22.1MB

    • MD5

      c111819eab30850f1a2b0013c13ed599

    • SHA1

      ddf9d444ee4914194798a2a6fe6b39795f54eabc

    • SHA256

      6e4c943d59d7c9ae951de1e14f35a47af766be7cb2680b6915ae9713b5eb2887

    • SHA512

      cd5a0902cab21d90aa14e9c344b68cade4710922f8ddd30a8c204bbc941418c8e9ea45a0341dfd0504226b52206e167ae9580d18894517748285c5882a73c37b

    • SSDEEP

      24576:BWc7SR2xuGBRBgOiULNFOAL+ToFZxvYR:BWVR2MrOiUh8LME

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Modifies WinLogon for persistence

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v16

Tasks