General

  • Target

    GHLDRO.exe

  • Size

    13.7MB

  • Sample

    210806-k4l28kehks

  • MD5

    a8f3f22dda294b02f410ca95116a23bf

  • SHA1

    413062e5f6a7ec6c23cb56fbb68c8984855e8a58

  • SHA256

    64f87a54df363755339567ae103af89b64be18546b14b22b93610e0080c3793d

  • SHA512

    a75fc1269444e2aff46a7901da89fd56b17120c56e4c7f89147a673e312dcc09366c9f16d3b4082f27a19a6f6aeed420c07112a5cbd04f8cd53d9792bb2ea711

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

onlinebonjour1pt.ddns.net:1605

Mutex

DC_MUTEX-XJRH105

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    7qC8eTvgaGxs

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdapt

Targets

    • Target

      GHLDRO.exe

    • Size

      13.7MB

    • MD5

      a8f3f22dda294b02f410ca95116a23bf

    • SHA1

      413062e5f6a7ec6c23cb56fbb68c8984855e8a58

    • SHA256

      64f87a54df363755339567ae103af89b64be18546b14b22b93610e0080c3793d

    • SHA512

      a75fc1269444e2aff46a7901da89fd56b17120c56e4c7f89147a673e312dcc09366c9f16d3b4082f27a19a6f6aeed420c07112a5cbd04f8cd53d9792bb2ea711

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Modifies firewall policy service

    • Modifies security service

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Executes dropped EXE

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • autoit_exe

      AutoIT scripts compiled to PE executables.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Modify Existing Service

2
T1031

Hidden Files and Directories

2
T1158

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

6
T1112

Disabling Security Tools

2
T1089

Hidden Files and Directories

2
T1158

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks