General

  • Target

    4c44224a2703b19147751b2926bd047e82dd80305141a253418594c6f4672818

  • Size

    690KB

  • Sample

    220525-aplxmaggej

  • MD5

    6b5b75a9e7c39b3737029ac0bde1c152

  • SHA1

    def2b6e36621133659ac94cc9bc60cbe7743c6ce

  • SHA256

    4c44224a2703b19147751b2926bd047e82dd80305141a253418594c6f4672818

  • SHA512

    d0f74e89c78a3baf9907799790b0aba7a7ed8594db502397e52106f0a114aad5c4435a49a59f56a785427b06a59f28636d3de3e6125a82a34b3f07fedc6a4d90

Malware Config

Extracted

Family

darkcomet

Botnet

All

C2

127.0.0.1:1604

Mutex

DC_MUTEX-W1Y6BV1

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    6zPJwU2MxqV4

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

Targets

    • Target

      4c44224a2703b19147751b2926bd047e82dd80305141a253418594c6f4672818

    • Size

      690KB

    • MD5

      6b5b75a9e7c39b3737029ac0bde1c152

    • SHA1

      def2b6e36621133659ac94cc9bc60cbe7743c6ce

    • SHA256

      4c44224a2703b19147751b2926bd047e82dd80305141a253418594c6f4672818

    • SHA512

      d0f74e89c78a3baf9907799790b0aba7a7ed8594db502397e52106f0a114aad5c4435a49a59f56a785427b06a59f28636d3de3e6125a82a34b3f07fedc6a4d90

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Executes dropped EXE

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Hidden Files and Directories

2
T1158

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Hidden Files and Directories

2
T1158

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks