General

  • Target

    eb37bfd04a799f257163030196f110fb6c12eea4e797bcd3e14c12b6ac789666

  • Size

    1.8MB

  • Sample

    201111-7hjjdeb5x6

  • MD5

    72263cf2067ce1601a07f821b1b84755

  • SHA1

    05814d589db2d6c9b64e025de8183c2d705c9c38

  • SHA256

    eb37bfd04a799f257163030196f110fb6c12eea4e797bcd3e14c12b6ac789666

  • SHA512

    4e7dfbe8d189cd4ba8f338141dd6a10488233d3ce8d25ba3a760c62a222ef2a3f99172fb21837230b7fab8fba1168cef08f90aca62f0ad764992f41f9e7df9f8

Malware Config

Extracted

Family

darkcomet

Botnet

vbsted

C2

forshared.ddns.net:6722

Mutex

DC_MUTEX-6UPV0L8

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    kWdnrSvNCdV5

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

Targets

    • Target

      eb37bfd04a799f257163030196f110fb6c12eea4e797bcd3e14c12b6ac789666

    • Size

      1.8MB

    • MD5

      72263cf2067ce1601a07f821b1b84755

    • SHA1

      05814d589db2d6c9b64e025de8183c2d705c9c38

    • SHA256

      eb37bfd04a799f257163030196f110fb6c12eea4e797bcd3e14c12b6ac789666

    • SHA512

      4e7dfbe8d189cd4ba8f338141dd6a10488233d3ce8d25ba3a760c62a222ef2a3f99172fb21837230b7fab8fba1168cef08f90aca62f0ad764992f41f9e7df9f8

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

System Information Discovery

2
T1082

Tasks