General

  • Target

    19962480e1ea3d8a3c00250e8e7867e7_JaffaCakes118

  • Size

    5.9MB

  • Sample

    240628-k79rhs1gpg

  • MD5

    19962480e1ea3d8a3c00250e8e7867e7

  • SHA1

    d0240accf1b93436deb4d681bdbf1882420c1ff2

  • SHA256

    c08fbf1f549669dd048f5008b7f5f3150d1fb0dc7f6a420b369eb7469dfbc3e2

  • SHA512

    ae7f73c7e600a1b4d27b871af2962cfffcbe7f8fdae87f0344c8396c7326bd06a2ea89273d8ac03974c2ed0eb96bdcb28d4759132d43fdb81bbd286530364267

  • SSDEEP

    98304:cLILI6zcwPD3WCvdmVoyfgqo8BRqSTOUhNJsiTN1G1ja+ps5mIWWx:cLz6wwb3WdHIqo8BhSUhN/RCj7i5mvK

Malware Config

Extracted

Family

darkcomet

Botnet

Test1

C2

fttpsrvr.serveftp.com:81

Mutex

DC_MUTEX-KC4MATP

Attributes
  • gencode

    bwdrBTvAAiq3

  • install

    false

  • offline_keylogger

    true

  • password

    0137982645

  • persistence

    false

Targets

    • Target

      19962480e1ea3d8a3c00250e8e7867e7_JaffaCakes118

    • Size

      5.9MB

    • MD5

      19962480e1ea3d8a3c00250e8e7867e7

    • SHA1

      d0240accf1b93436deb4d681bdbf1882420c1ff2

    • SHA256

      c08fbf1f549669dd048f5008b7f5f3150d1fb0dc7f6a420b369eb7469dfbc3e2

    • SHA512

      ae7f73c7e600a1b4d27b871af2962cfffcbe7f8fdae87f0344c8396c7326bd06a2ea89273d8ac03974c2ed0eb96bdcb28d4759132d43fdb81bbd286530364267

    • SSDEEP

      98304:cLILI6zcwPD3WCvdmVoyfgqo8BRqSTOUhNJsiTN1G1ja+ps5mIWWx:cLz6wwb3WdHIqo8BhSUhN/RCj7i5mvK

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Adds Run key to start application

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Winlogon Helper DLL

1
T1547.004

Privilege Escalation

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Winlogon Helper DLL

1
T1547.004

Defense Evasion

Modify Registry

2
T1112

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Virtualization/Sandbox Evasion

1
T1497

Tasks