Resubmissions

25-02-2022 03:09

220225-dnmz3sffbn 10

23-02-2022 04:21

220223-eym89sabhr 10

General

  • Target

    a

  • Size

    1.5MB

  • Sample

    220225-dnmz3sffbn

  • MD5

    7264b8eb7076a2b78617e0e38058d0f3

  • SHA1

    03cd675e664f434773d9c069c0a59b428cd1bedc

  • SHA256

    728418b13e48aacdb925ae8b891e0f0a35ec8482c92f65fefe8bd4ab890224d2

  • SHA512

    47f1d0fef411ab7fcc587b1fad1b143c69dc0723ff58f7d0d8f9d29efe2bcc8ca016b6536996a2a3bc7af2b49a378c68d03876962d5a84eea01c0f119a0643e1

Malware Config

Extracted

Family

darkcomet

Botnet

Sazan

C2

akordion.duckdns.org:1604

Mutex

DC_MUTEX-CADHQZA

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    344KSen6NjLL

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

Targets

    • Target

      a

    • Size

      1.5MB

    • MD5

      7264b8eb7076a2b78617e0e38058d0f3

    • SHA1

      03cd675e664f434773d9c069c0a59b428cd1bedc

    • SHA256

      728418b13e48aacdb925ae8b891e0f0a35ec8482c92f65fefe8bd4ab890224d2

    • SHA512

      47f1d0fef411ab7fcc587b1fad1b143c69dc0723ff58f7d0d8f9d29efe2bcc8ca016b6536996a2a3bc7af2b49a378c68d03876962d5a84eea01c0f119a0643e1

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Executes dropped EXE

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Persistence

Winlogon Helper DLL

1
T1004

Hidden Files and Directories

2
T1158

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Hidden Files and Directories

2
T1158

Scripting

1
T1064

Tasks