General

  • Target

    46b620f55c618725f4bbf2889e0427d819804ec89263efb836e800118160d940

  • Size

    308KB

  • Sample

    220707-jswexafgbq

  • MD5

    a7495ebd5b117c20f373a1769534470a

  • SHA1

    2fa33f0113d280d0aaa73e94e79a4c02fa78e788

  • SHA256

    46b620f55c618725f4bbf2889e0427d819804ec89263efb836e800118160d940

  • SHA512

    363385c5726ad38918e5769c668feb4cf4e42f8a6dab847f25d452c56d92d1934f2573b3a1026098fd0c67c995be6967ef3e73ce2639ded00636e30ed1d546d9

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

bibl12345.ddns.net:1604

Mutex

DC_MUTEX-AJ56C7W

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    Jy8jYvuQiUbf

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    Windows

Targets

    • Target

      46b620f55c618725f4bbf2889e0427d819804ec89263efb836e800118160d940

    • Size

      308KB

    • MD5

      a7495ebd5b117c20f373a1769534470a

    • SHA1

      2fa33f0113d280d0aaa73e94e79a4c02fa78e788

    • SHA256

      46b620f55c618725f4bbf2889e0427d819804ec89263efb836e800118160d940

    • SHA512

      363385c5726ad38918e5769c668feb4cf4e42f8a6dab847f25d452c56d92d1934f2573b3a1026098fd0c67c995be6967ef3e73ce2639ded00636e30ed1d546d9

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Modifies firewall policy service

    • Modifies security service

    • Ramnit

      Ramnit is a versatile family that holds viruses, worms, and Trojans.

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Executes dropped EXE

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Modify Existing Service

2
T1031

Hidden Files and Directories

2
T1158

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

8
T1112

Disabling Security Tools

2
T1089

Hidden Files and Directories

2
T1158

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks