General

  • Target

    c2c82ee2700333d677bee2937f99b1e5657f339e23c27b5b7d2a397b672fffd9

  • Size

    932KB

  • Sample

    200624-v7pg8gxvbx

  • MD5

    1dc80685c258916d30f9bf2365d76ff5

  • SHA1

    bc0111105913d61308b5164833d31574d0391543

  • SHA256

    c2c82ee2700333d677bee2937f99b1e5657f339e23c27b5b7d2a397b672fffd9

  • SHA512

    7bf344038fc679919f30f93070c666c5409d76f81b8a79cf6aeda9d356ad7b9b570de0e994b4dd20096e3b3869b63ad496361f08bbd24eaa3eea6580aa965ba2

Malware Config

Extracted

Family

darkcomet

Botnet

Test Server

C2

127.0.0.1:1604

Mutex

DC_MUTEX-4XKPULH

Attributes
  • gencode

    LBSgYfRa7QDe

  • install

    false

  • offline_keylogger

    true

  • persistence

    false

Targets

    • Target

      c2c82ee2700333d677bee2937f99b1e5657f339e23c27b5b7d2a397b672fffd9

    • Size

      932KB

    • MD5

      1dc80685c258916d30f9bf2365d76ff5

    • SHA1

      bc0111105913d61308b5164833d31574d0391543

    • SHA256

      c2c82ee2700333d677bee2937f99b1e5657f339e23c27b5b7d2a397b672fffd9

    • SHA512

      7bf344038fc679919f30f93070c666c5409d76f81b8a79cf6aeda9d356ad7b9b570de0e994b4dd20096e3b3869b63ad496361f08bbd24eaa3eea6580aa965ba2

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies system executable filetype association

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Change Default File Association

1
T1042

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks