General

  • Target

    7d50e7733ae44d92ee7039760eeaf50e88b540369de86441b829635e0edc583e

  • Size

    1.8MB

  • Sample

    201108-89cjvgt1v6

  • MD5

    f183f2ab7e5d0ca6934664b4f0aa7ee9

  • SHA1

    34ee0819365d8e4313bea00d100ae99d39b11bc0

  • SHA256

    7d50e7733ae44d92ee7039760eeaf50e88b540369de86441b829635e0edc583e

  • SHA512

    f5770ad4ad1c4fddbb158c952f8aecaf92997ada35b01c120e77fcc8e573c2fdd5446fabe2c0946a58c45d896e11e800dc7ddf9d30f4eb758e6a8401bdd50cc8

Malware Config

Extracted

Family

darkcomet

Botnet

vbsted

C2

forshared.ddns.net:6722

Mutex

DC_MUTEX-6UPV0L8

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    kWdnrSvNCdV5

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

Targets

    • Target

      7d50e7733ae44d92ee7039760eeaf50e88b540369de86441b829635e0edc583e

    • Size

      1.8MB

    • MD5

      f183f2ab7e5d0ca6934664b4f0aa7ee9

    • SHA1

      34ee0819365d8e4313bea00d100ae99d39b11bc0

    • SHA256

      7d50e7733ae44d92ee7039760eeaf50e88b540369de86441b829635e0edc583e

    • SHA512

      f5770ad4ad1c4fddbb158c952f8aecaf92997ada35b01c120e77fcc8e573c2fdd5446fabe2c0946a58c45d896e11e800dc7ddf9d30f4eb758e6a8401bdd50cc8

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

System Information Discovery

2
T1082

Tasks