General

  • Target

    72263cf2067ce1601a07f821b1b84755

  • Size

    1.8MB

  • Sample

    201117-bnqaevy14e

  • MD5

    739ca775c833ba8c469ee2a53e1db2b5

  • SHA1

    60fcb08996081e8ea4c7fee17a2861ee56c62a5d

  • SHA256

    52d5e596c1da82e5895bcd485a98989ff1b81ab3ee5baa13a41ff1c2808493eb

  • SHA512

    4e36ed5e3359c21648290843d4607e64b2229399c1919438d2301c17b3cac010062dee23037cc9fd8d7311764ee832659c71c6f6b2612a3922d331de22941fb2

Malware Config

Extracted

Family

darkcomet

Botnet

vbsted

C2

forshared.ddns.net:6722

Mutex

DC_MUTEX-6UPV0L8

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    kWdnrSvNCdV5

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

Targets

    • Target

      72263cf2067ce1601a07f821b1b84755

    • Size

      1.8MB

    • MD5

      739ca775c833ba8c469ee2a53e1db2b5

    • SHA1

      60fcb08996081e8ea4c7fee17a2861ee56c62a5d

    • SHA256

      52d5e596c1da82e5895bcd485a98989ff1b81ab3ee5baa13a41ff1c2808493eb

    • SHA512

      4e36ed5e3359c21648290843d4607e64b2229399c1919438d2301c17b3cac010062dee23037cc9fd8d7311764ee832659c71c6f6b2612a3922d331de22941fb2

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

System Information Discovery

2
T1082

Tasks