a0f7c2f2ac9cd595abc825bbed28df20ffdbbf7664269cf3c49c106a267dba62

General
Target

a0f7c2f2ac9cd595abc825bbed28df20ffdbbf7664269cf3c49c106a267dba62

Size

252KB

Sample

220521-w68zdabag8

Score
10 /10
MD5

532a6afb45c841f08a0ff9f104559334

SHA1

2fe9463e271b50907d72174992f4adf5c5c5eace

SHA256

a0f7c2f2ac9cd595abc825bbed28df20ffdbbf7664269cf3c49c106a267dba62

SHA512

313db495bc51449b94484e749a2bee932686fabdfcf2e1a6e2c8caa10fe034960408c2f6a9b90f31e3ae55a1881752fab4baf1bae1fc5d14cf073884c358e7a4

Malware Config

Extracted

Family darkcomet
Botnet stepa_po4ta
C2

triplekill.ddns.net:1604

Attributes
InstallPath
MSDCSC\proverka_stiller.exe
gencode
qsGLcJtz3RXp
install
true
offline_keylogger
true
persistence
false
reg_key
Java
Targets
Target

a0f7c2f2ac9cd595abc825bbed28df20ffdbbf7664269cf3c49c106a267dba62

MD5

532a6afb45c841f08a0ff9f104559334

Filesize

252KB

Score
10/10
SHA1

2fe9463e271b50907d72174992f4adf5c5c5eace

SHA256

a0f7c2f2ac9cd595abc825bbed28df20ffdbbf7664269cf3c49c106a267dba62

SHA512

313db495bc51449b94484e749a2bee932686fabdfcf2e1a6e2c8caa10fe034960408c2f6a9b90f31e3ae55a1881752fab4baf1bae1fc5d14cf073884c358e7a4

Tags

Signatures

  • Darkcomet

    Description

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    Tags

  • Modifies WinLogon for persistence

    Tags

    TTPs

    Winlogon Helper DLLModify Registry
  • Modifies firewall policy service

    Tags

    TTPs

    Modify RegistryModify Existing Service
  • Executes dropped EXE

  • UPX packed file

    Description

    Detects executables packed with UPX/modified UPX open source packer.

    Tags

  • Checks computer location settings

    Description

    Looks up country code configured in the registry, likely geofence.

    TTPs

    Query RegistrySystem Information Discovery
  • Loads dropped DLL

  • Adds Run key to start application

    Tags

    TTPs

    Registry Run Keys / Startup FolderModify Registry
  • Drops file in System32 directory

Related Tasks

MITRE ATT&CK Matrix
Collection
    Command and Control
      Credential Access
        Defense Evasion
        Execution
          Exfiltration
            Impact
              Initial Access
                Lateral Movement
                  Privilege Escalation