General

  • Target

    cfa850db87d98eed49dec543a7977ef9221dc62bd48c7aaaaafe1327c864aa72

  • Size

    1.3MB

  • Sample

    210908-hfcatshbdq

  • MD5

    50889863763dec84072482d72d257a5a

  • SHA1

    ee585ed89df214b743ceb8fe2cf85999e6013806

  • SHA256

    cfa850db87d98eed49dec543a7977ef9221dc62bd48c7aaaaafe1327c864aa72

  • SHA512

    4fb2c1a727d4b703e0e88eef85b4d57f181f9a0658219e493f3a3435c98defb0dc845c3d07b5be1d0bac5357f3e2a5b03e38b696fa846e8e17b4fc50f5c5d5eb

Malware Config

Extracted

Family

darkcomet

Botnet

m2

C2

127.0.0.1:1604

laylaylom15975300.freeddns.org:1604

Mutex

DC_MUTEX-J1SBQ5X

Attributes
  • InstallPath

    MSDCSC\iexplorer.exe

  • gencode

    bTMSQkMKM11U

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    Windows Defender

Targets

    • Target

      cfa850db87d98eed49dec543a7977ef9221dc62bd48c7aaaaafe1327c864aa72

    • Size

      1.3MB

    • MD5

      50889863763dec84072482d72d257a5a

    • SHA1

      ee585ed89df214b743ceb8fe2cf85999e6013806

    • SHA256

      cfa850db87d98eed49dec543a7977ef9221dc62bd48c7aaaaafe1327c864aa72

    • SHA512

      4fb2c1a727d4b703e0e88eef85b4d57f181f9a0658219e493f3a3435c98defb0dc845c3d07b5be1d0bac5357f3e2a5b03e38b696fa846e8e17b4fc50f5c5d5eb

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Modifies security service

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Modify Existing Service

2
T1031

Hidden Files and Directories

2
T1158

Registry Run Keys / Startup Folder

1
T1060

Privilege Escalation

Bypass User Account Control

1
T1088

Defense Evasion

Modify Registry

7
T1112

Bypass User Account Control

1
T1088

Disabling Security Tools

3
T1089

Hidden Files and Directories

2
T1158

Discovery

Query Registry

1
T1012

System Information Discovery

3
T1082

Remote System Discovery

1
T1018

Tasks