General

  • Target

    b1418392b544a51ff07f543c3f76030f

  • Size

    1.1MB

  • Sample

    201117-l31vc6r9y6

  • MD5

    b1418392b544a51ff07f543c3f76030f

  • SHA1

    6fbad484bbfd66afc868c6d1d700aa3eed644e70

  • SHA256

    dd146247f7cb47a6256829a01089d8e95d67d31d52431eeb0261333615927152

  • SHA512

    a14feac08bc7b4da4ccb9ddff8069bee7c2ac125c9128ae773cbf546d0bc03c76ae7b2c292916062fcc691969ef062c008ce578ac69c663c5de0340173364d87

Malware Config

Extracted

Family

darkcomet

Botnet

Winrar 5.0 final 10-10-2013

C2

rainbowie.no-ip.biz:2302

Mutex

DC_MUTEX-GL3ZW69

Attributes
  • InstallPath

    windirsx.exe

  • gencode

    4EYDgQDgUmXr

  • install

    true

  • offline_keylogger

    true

  • password

    hypethetimet

  • persistence

    true

  • reg_key

    Windows Login System

Targets

    • Target

      b1418392b544a51ff07f543c3f76030f

    • Size

      1.1MB

    • MD5

      b1418392b544a51ff07f543c3f76030f

    • SHA1

      6fbad484bbfd66afc868c6d1d700aa3eed644e70

    • SHA256

      dd146247f7cb47a6256829a01089d8e95d67d31d52431eeb0261333615927152

    • SHA512

      a14feac08bc7b4da4ccb9ddff8069bee7c2ac125c9128ae773cbf546d0bc03c76ae7b2c292916062fcc691969ef062c008ce578ac69c663c5de0340173364d87

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks