General

  • Target

    JaffaCakes118_c24b23d3c854fceb5e4af9d151ffe7fc

  • Size

    7.3MB

  • Sample

    250419-l1wrravps8

  • MD5

    c24b23d3c854fceb5e4af9d151ffe7fc

  • SHA1

    90419748e89d38f964db9e8eac4ca62b6a355460

  • SHA256

    8ed58fccd0234e53dd1b82468875c8e34e02c4b6d51c93041077bc412fb482bf

  • SHA512

    fe9b05ef5bb9551f7d6f8d72afad2e6e40a646e8c897213c0aaed84f7b3960c8ea45c2f3a48a35a0f3140cd97e79f9b5c8d376ff140b270b3fffce87504c78b8

  • SSDEEP

    98304:3Xo61VhZXRqa3KNLY1zNwrTPzQAqZto4OP2+95Zohk95TadWSMBoAI5Ku77v:no61LtRnaNM1zBOPjdohk9Ra0Ss9

Malware Config

Extracted

Family

darkcomet

Botnet

Hacking

C2

127.0.0.1:82

kindos223.zapto.org:82

Mutex

DC_MUTEX-A3AJRZF

Attributes
  • gencode

    kPer*-ghPCmM

  • install

    false

  • offline_keylogger

    false

  • persistence

    false

rc4.plain

Extracted

Family

darkcomet

Attributes
  • gencode

  • install

    false

  • offline_keylogger

    false

  • persistence

    false

rc4.plain

Targets

    • Target

      JaffaCakes118_c24b23d3c854fceb5e4af9d151ffe7fc

    • Size

      7.3MB

    • MD5

      c24b23d3c854fceb5e4af9d151ffe7fc

    • SHA1

      90419748e89d38f964db9e8eac4ca62b6a355460

    • SHA256

      8ed58fccd0234e53dd1b82468875c8e34e02c4b6d51c93041077bc412fb482bf

    • SHA512

      fe9b05ef5bb9551f7d6f8d72afad2e6e40a646e8c897213c0aaed84f7b3960c8ea45c2f3a48a35a0f3140cd97e79f9b5c8d376ff140b270b3fffce87504c78b8

    • SSDEEP

      98304:3Xo61VhZXRqa3KNLY1zNwrTPzQAqZto4OP2+95Zohk95TadWSMBoAI5Ku77v:no61LtRnaNM1zBOPjdohk9Ra0Ss9

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Uses the VBS compiler for execution

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v16

Tasks