General

  • Target

    62495c2cfde10b47d1c2cc907822fec4ca4f8b6e51c9216cf1dfdcc454c8a8d5

  • Size

    762KB

  • Sample

    220520-ptw1qabgb2

  • MD5

    acaedef2c694bd1d58f4cb82ffb6318b

  • SHA1

    316f234a5571b199a7d948f541ad3982536c033a

  • SHA256

    62495c2cfde10b47d1c2cc907822fec4ca4f8b6e51c9216cf1dfdcc454c8a8d5

  • SHA512

    82f718bc54003f0537e7923285ed6d3188e458301f95029d0d273660f643755af5d2654f9acc4f23dd62e8fb15b0e114c308b7cf4dfbd673579f4f1d5b804513

Malware Config

Extracted

Family

darkcomet

Botnet

×èòåð

C2

62.33.2.50:1111

happycraft.hopto.org:1111

Mutex

DC_MUTEX-1BX3PA1

Attributes
  • InstallPath

    temp\java.exe

  • gencode

    6hPE8cPj7vE4

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    java.exe

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

62.33.2.50:2222

Mutex

41aabe8f8c6d7c53ac94c0ce4c6ce249

Attributes
  • reg_key

    41aabe8f8c6d7c53ac94c0ce4c6ce249

  • splitter

    |'|'|

Targets

    • Target

      62495c2cfde10b47d1c2cc907822fec4ca4f8b6e51c9216cf1dfdcc454c8a8d5

    • Size

      762KB

    • MD5

      acaedef2c694bd1d58f4cb82ffb6318b

    • SHA1

      316f234a5571b199a7d948f541ad3982536c033a

    • SHA256

      62495c2cfde10b47d1c2cc907822fec4ca4f8b6e51c9216cf1dfdcc454c8a8d5

    • SHA512

      82f718bc54003f0537e7923285ed6d3188e458301f95029d0d273660f643755af5d2654f9acc4f23dd62e8fb15b0e114c308b7cf4dfbd673579f4f1d5b804513

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Modifies firewall policy service

    • Modifies security service

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Windows security bypass

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • suricata: ET MALWARE Common RAT Connectivity Check Observed

      suricata: ET MALWARE Common RAT Connectivity Check Observed

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Initial Access

Replication Through Removable Media

1
T1091

Execution

Scheduled Task

1
T1053

Persistence

Winlogon Helper DLL

1
T1004

Modify Existing Service

3
T1031

Hidden Files and Directories

2
T1158

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

7
T1112

Disabling Security Tools

2
T1089

Hidden Files and Directories

2
T1158

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Lateral Movement

Replication Through Removable Media

1
T1091

Tasks