General

  • Target

    0edfdfc0c5e35db4ea163ad41db66ffc1bce6362f26f9144950cc0df7db9db8f

  • Size

    2.9MB

  • Sample

    220521-w7a4qsedal

  • MD5

    fa42ccd6f594bffeddd05814c6b2aa1b

  • SHA1

    59c19db02b4e6bc28089b38a517c78e555f8ef3a

  • SHA256

    0edfdfc0c5e35db4ea163ad41db66ffc1bce6362f26f9144950cc0df7db9db8f

  • SHA512

    49f7ce75180996d409eb4864854340fe8cc8a1e4031f0e3082d7918a758e3dc21c289285b97f8db63c18f5a36928d98436281e583e1c277dd4f6bec2e8798edb

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

ggafa.hopto.org:1604

Mutex

DC_MUTEX-WD3Q1KE

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    buaMe2MjX7EH

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    MicroUpdate

Targets

    • Target

      0edfdfc0c5e35db4ea163ad41db66ffc1bce6362f26f9144950cc0df7db9db8f

    • Size

      2.9MB

    • MD5

      fa42ccd6f594bffeddd05814c6b2aa1b

    • SHA1

      59c19db02b4e6bc28089b38a517c78e555f8ef3a

    • SHA256

      0edfdfc0c5e35db4ea163ad41db66ffc1bce6362f26f9144950cc0df7db9db8f

    • SHA512

      49f7ce75180996d409eb4864854340fe8cc8a1e4031f0e3082d7918a758e3dc21c289285b97f8db63c18f5a36928d98436281e583e1c277dd4f6bec2e8798edb

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks