General

  • Target

    Recu.exe

  • Size

    871KB

  • Sample

    201021-t13kbn41dj

  • MD5

    fe655433e25918abfbf8d0a748b53ebd

  • SHA1

    2481b3aa2a0084a7aa8a5dae26e7a95bd948cd61

  • SHA256

    c960f47eb155a0066c0e4e279c296d0516edf66cf032b44188fe3d7f3a16aef6

  • SHA512

    7ff96e75adaf8c03f99825bbc93bfe2391934fa71acb2a80cd02a994105497ca76f96f62ea8905409d97c2855ee7fc9a12dd3f4f35f0c8456108925d28023a2d

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

127.0.0.1:100

Mutex

DC_MUTEX-J4K9R5R

Attributes
  • gencode

    XsFtyCs9yfyB

  • install

    false

  • offline_keylogger

    true

  • persistence

    false

Targets

    • Target

      Recu.exe

    • Size

      871KB

    • MD5

      fe655433e25918abfbf8d0a748b53ebd

    • SHA1

      2481b3aa2a0084a7aa8a5dae26e7a95bd948cd61

    • SHA256

      c960f47eb155a0066c0e4e279c296d0516edf66cf032b44188fe3d7f3a16aef6

    • SHA512

      7ff96e75adaf8c03f99825bbc93bfe2391934fa71acb2a80cd02a994105497ca76f96f62ea8905409d97c2855ee7fc9a12dd3f4f35f0c8456108925d28023a2d

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks