General

  • Target

    setup.exe

  • Size

    634KB

  • Sample

    211202-b5mpjadae5

  • MD5

    a5a31f043f4e293e2760ccb4f209451e

  • SHA1

    81ca6f4f16e8968e789332a6f3a6bf6847ed5fd5

  • SHA256

    18f6743a982938fa45f0505b542d114a803e1246cb93382f71cf3b5598f3e986

  • SHA512

    19205650a46d3db2eb02ceb060da1297b6b774fa1f08aa3f93e9ed251733bb73094f915e2e68b438364b68a02a5102d9cc83ad890ddafc6a0413adf71fa61ecc

Malware Config

Extracted

Family

darkcomet

Botnet

dobe Photoshop 2022

C2

clientts.ddns.net:1604

Mutex

DCMIN_MUTEX-AXQ2YN9

Attributes
  • gencode

    6dlKzQlMJ5u3

  • install

    false

  • offline_keylogger

    true

  • persistence

    false

Targets

    • Target

      setup.exe

    • Size

      634KB

    • MD5

      a5a31f043f4e293e2760ccb4f209451e

    • SHA1

      81ca6f4f16e8968e789332a6f3a6bf6847ed5fd5

    • SHA256

      18f6743a982938fa45f0505b542d114a803e1246cb93382f71cf3b5598f3e986

    • SHA512

      19205650a46d3db2eb02ceb060da1297b6b774fa1f08aa3f93e9ed251733bb73094f915e2e68b438364b68a02a5102d9cc83ad890ddafc6a0413adf71fa61ecc

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Persistence

Winlogon Helper DLL

1
T1004

Defense Evasion

Modify Registry

1
T1112

Scripting

1
T1064

Tasks