General

  • Target

    e0380fd96474eebdde85471abc553c688cef21db70120fb7352151ad58c954a2

  • Size

    1.5MB

  • Sample

    210928-k988rsbdgm

  • MD5

    f548e99a9e0b219930e28696a0979619

  • SHA1

    fc09b9c82ac761f28a04c2d4d3bdf07b000d6b47

  • SHA256

    e0380fd96474eebdde85471abc553c688cef21db70120fb7352151ad58c954a2

  • SHA512

    bf875c949a83a1babd1f6c91fc707aac7e759cfa043f7289c96ff1ebdee30ea423277896cd2ebabfaf206d4a8e81a708aa93cdbe2d6255487582ff85d50aded7

Malware Config

Extracted

Family

darkcomet

Botnet

Sazan

C2

127.0.0.1:1604

Mutex

DC_MUTEX-SWYB0HA

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    jA5Q6JBljsdN

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    MicroUpdate

Targets

    • Target

      e0380fd96474eebdde85471abc553c688cef21db70120fb7352151ad58c954a2

    • Size

      1.5MB

    • MD5

      f548e99a9e0b219930e28696a0979619

    • SHA1

      fc09b9c82ac761f28a04c2d4d3bdf07b000d6b47

    • SHA256

      e0380fd96474eebdde85471abc553c688cef21db70120fb7352151ad58c954a2

    • SHA512

      bf875c949a83a1babd1f6c91fc707aac7e759cfa043f7289c96ff1ebdee30ea423277896cd2ebabfaf206d4a8e81a708aa93cdbe2d6255487582ff85d50aded7

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Executes dropped EXE

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Persistence

Winlogon Helper DLL

1
T1004

Hidden Files and Directories

2
T1158

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Hidden Files and Directories

2
T1158

Scripting

1
T1064

Tasks