General

  • Target

    5daf38ba7d08872375f14a3d8de794d20aa37e1caeda4da0558e2a9cd4ed668a

  • Size

    722KB

  • Sample

    210903-k3cwzschb2

  • MD5

    806b65a2f241146d01b77369371e59f6

  • SHA1

    f95281954408ad3132235c0baa6f75ae00cd748a

  • SHA256

    5daf38ba7d08872375f14a3d8de794d20aa37e1caeda4da0558e2a9cd4ed668a

  • SHA512

    5c0152ae672a9557244d960c8838e36e0ccdad7234df1076a621f07d4cea5348d6d982fe41dd1060503baa0d69969913d82119b15e8c89f6641b55d806a7946f

Malware Config

Extracted

Family

metasploit

Version

metasploit_stager

C2

192.168.1.10:1604

Extracted

Family

darkcomet

Botnet

Guest16

C2

127.0.0.1:1604

Mutex

DC_MUTEX-LDXAQCA

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    uT8Um6D8y43p

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

Targets

    • Target

      5daf38ba7d08872375f14a3d8de794d20aa37e1caeda4da0558e2a9cd4ed668a

    • Size

      722KB

    • MD5

      806b65a2f241146d01b77369371e59f6

    • SHA1

      f95281954408ad3132235c0baa6f75ae00cd748a

    • SHA256

      5daf38ba7d08872375f14a3d8de794d20aa37e1caeda4da0558e2a9cd4ed668a

    • SHA512

      5c0152ae672a9557244d960c8838e36e0ccdad7234df1076a621f07d4cea5348d6d982fe41dd1060503baa0d69969913d82119b15e8c89f6641b55d806a7946f

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Modifies WinLogon for persistence

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

System Information Discovery

1
T1082

Tasks