General

  • Target

    e01c2cb5400fc2b1739f6705ecd0b4ce42c7339f0101c4d92d40ec2db07a0956

  • Size

    1.3MB

  • Sample

    220521-aw5nbaahe2

  • MD5

    0cfbd4e91dea075e7f3731ed5116c945

  • SHA1

    ab10a58d6cdfa713405c6f3ea32bcea5fb01567a

  • SHA256

    e01c2cb5400fc2b1739f6705ecd0b4ce42c7339f0101c4d92d40ec2db07a0956

  • SHA512

    0bfc21a4c6b54433b91d37036f2d72f51cdce0edfa7ab3422635f6b4925c142a6c156a0fb1151006f1de1c19460e1e47c46a61ec5418ce8c109b4a1b932407f7

Malware Config

Extracted

Family

darkcomet

Botnet

Áàòàðåéêà

C2

178.46.120.54:1604

Mutex

DC_MUTEX-NSKK5Q3

Attributes
  • InstallPath

    APP#\msdcsc.exe

  • gencode

    LasvCxAaw4RN

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    MicroUpdate

Targets

    • Target

      e01c2cb5400fc2b1739f6705ecd0b4ce42c7339f0101c4d92d40ec2db07a0956

    • Size

      1.3MB

    • MD5

      0cfbd4e91dea075e7f3731ed5116c945

    • SHA1

      ab10a58d6cdfa713405c6f3ea32bcea5fb01567a

    • SHA256

      e01c2cb5400fc2b1739f6705ecd0b4ce42c7339f0101c4d92d40ec2db07a0956

    • SHA512

      0bfc21a4c6b54433b91d37036f2d72f51cdce0edfa7ab3422635f6b4925c142a6c156a0fb1151006f1de1c19460e1e47c46a61ec5418ce8c109b4a1b932407f7

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Modifies security service

    • Windows security bypass

    • Executes dropped EXE

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks