General

  • Target

    7744292984634c7a638686636bca0aa7

  • Size

    1.7MB

  • Sample

    201117-642hd2r842

  • MD5

    370f76a9253bd1fa83bb0dc1d22ee657

  • SHA1

    2a3bd7f2cefc1f7097861a816319b4a9f6bf5ec5

  • SHA256

    b906fffb5dfe57a4a0704e2a89803ce0af2f9e6dc16338fab258051f1c8c4c0e

  • SHA512

    ed6609bc1f544a12879cb15fd238dbd0899f1f1469ea4d28f6ebaaf3f286aa1f9aaa13cf8c6adf4afb0908d25316176023bacb5495867a6f93cebff10d9865af

Malware Config

Extracted

Family

darkcomet

Botnet

Minecraft ModPack

C2

nikitahack.ddns.net:1604

Mutex

DC_MUTEX-QGCEW90

Attributes
  • InstallPath

    Java\JavawsJRE06.exe

  • gencode

    uYzRTNcaeUFc

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    JavaUpdater

Targets

    • Target

      7744292984634c7a638686636bca0aa7

    • Size

      1.7MB

    • MD5

      370f76a9253bd1fa83bb0dc1d22ee657

    • SHA1

      2a3bd7f2cefc1f7097861a816319b4a9f6bf5ec5

    • SHA256

      b906fffb5dfe57a4a0704e2a89803ce0af2f9e6dc16338fab258051f1c8c4c0e

    • SHA512

      ed6609bc1f544a12879cb15fd238dbd0899f1f1469ea4d28f6ebaaf3f286aa1f9aaa13cf8c6adf4afb0908d25316176023bacb5495867a6f93cebff10d9865af

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • autoit_exe

      AutoIT scripts compiled to PE executables.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

System Information Discovery

1
T1082

Tasks