General

  • Target

    73f9c2b4e1fe637eabd8c9fae291e570faea874d5edf060d955372de42d4fd0c

  • Size

    692KB

  • Sample

    220520-z55r4sded8

  • MD5

    24f7cb12617bb15d9281a4f4039fc052

  • SHA1

    4200a8f021356e664fc60db4815ce2284c2b8b1e

  • SHA256

    73f9c2b4e1fe637eabd8c9fae291e570faea874d5edf060d955372de42d4fd0c

  • SHA512

    fad9ae0246904771f4b07e581f6003d9ca54d1409dd3a3dd028283f13740a9305495822c09dc0a693871253b578dc918b3010d25303cca33eedbd7fecc0412d7

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

12345poebalylovi.ddns.net:1604

12345poebalylovi.ddns.net:27015

Mutex

DC_MUTEX-KVBT238

Attributes
  • gencode

    eWLDJwG3jiE3

  • install

    false

  • offline_keylogger

    true

  • persistence

    false

Targets

    • Target

      73f9c2b4e1fe637eabd8c9fae291e570faea874d5edf060d955372de42d4fd0c

    • Size

      692KB

    • MD5

      24f7cb12617bb15d9281a4f4039fc052

    • SHA1

      4200a8f021356e664fc60db4815ce2284c2b8b1e

    • SHA256

      73f9c2b4e1fe637eabd8c9fae291e570faea874d5edf060d955372de42d4fd0c

    • SHA512

      fad9ae0246904771f4b07e581f6003d9ca54d1409dd3a3dd028283f13740a9305495822c09dc0a693871253b578dc918b3010d25303cca33eedbd7fecc0412d7

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies firewall policy service

    • Modifies security service

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Windows security modification

MITRE ATT&CK Enterprise v6

Tasks