General

  • Target

    SBHJYT.exe

  • Size

    13.9MB

  • Sample

    210814-74xqhqeafx

  • MD5

    20799f295c5b0e5aa27b5896b230b57a

  • SHA1

    e0e72f3a636f4dcd87bb5606f24fe0ff298fbb74

  • SHA256

    3d96847f7962c01a7951f95acb29dff7999b7e8d54c946b3b1ccd035cbf2bcb1

  • SHA512

    70cd3984c49da18dc9aeb852f745a8324a93583ab892af7f08bf5372cdb4ffc0cb0cce4033988d9088aaf1b0c740f612690addf9598ad3349ef6ef79112b3d16

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

onlinebonjour1pt.ddns.net:1605

Mutex

DC_MUTEX-K9JEE5J

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    PPlJGVizdNKt

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    Microdaptxx

Targets

    • Target

      SBHJYT.exe

    • Size

      13.9MB

    • MD5

      20799f295c5b0e5aa27b5896b230b57a

    • SHA1

      e0e72f3a636f4dcd87bb5606f24fe0ff298fbb74

    • SHA256

      3d96847f7962c01a7951f95acb29dff7999b7e8d54c946b3b1ccd035cbf2bcb1

    • SHA512

      70cd3984c49da18dc9aeb852f745a8324a93583ab892af7f08bf5372cdb4ffc0cb0cce4033988d9088aaf1b0c740f612690addf9598ad3349ef6ef79112b3d16

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Modifies firewall policy service

    • Modifies security service

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Executes dropped EXE

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • autoit_exe

      AutoIT scripts compiled to PE executables.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Modify Existing Service

2
T1031

Hidden Files and Directories

2
T1158

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

6
T1112

Disabling Security Tools

2
T1089

Hidden Files and Directories

2
T1158

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks