General

  • Target

    0004 Spec Orede Req.pdf.exe

  • Size

    1.8MB

  • Sample

    191209-bdedd588ca

  • MD5

    d7ee787127e8a5727dd90434f6941a2d

  • SHA1

    aec8070aeba0d4177476494336d6cccb752d83e6

  • SHA256

    d31b4b000ea53806260be91ca05b91bfcb04c56bd68ed457109e5cab14914587

  • SHA512

    57936249eea46d8af818e01e21017e3563223b1fb8c63cc5d4af95e1a5a3be6e446de01f3bf149d0a512585d6cf24dbb2557a4df382a46d0a0dc66ef06d9e5cf

Malware Config

Extracted

Family

darkcomet

Botnet

3-OCTOBER 2019

C2

timmy77.ddns.net:13251

Mutex

DC_MUTEX-AZAG0NH

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    EsnagdjpAd20

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

Targets

    • Target

      0004 Spec Orede Req.pdf.exe

    • Size

      1.8MB

    • MD5

      d7ee787127e8a5727dd90434f6941a2d

    • SHA1

      aec8070aeba0d4177476494336d6cccb752d83e6

    • SHA256

      d31b4b000ea53806260be91ca05b91bfcb04c56bd68ed457109e5cab14914587

    • SHA512

      57936249eea46d8af818e01e21017e3563223b1fb8c63cc5d4af95e1a5a3be6e446de01f3bf149d0a512585d6cf24dbb2557a4df382a46d0a0dc66ef06d9e5cf

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Discovery

System Information Discovery

1
T1082

Tasks