General

  • Target

    3c3f94f0f39bf7b9cd68223c3b15adc75508e7bc8ffb5226798a7c65856decb7

  • Size

    659KB

  • Sample

    220725-fjhkxaffcm

  • MD5

    8bb3a68557f90f14dde0fbc58ff13f6a

  • SHA1

    77441c777a3e9ad810ee16b39281cc4b80cbd92a

  • SHA256

    3c3f94f0f39bf7b9cd68223c3b15adc75508e7bc8ffb5226798a7c65856decb7

  • SHA512

    4583e34ac4ea68f6e78a18eb515e027c46ae71b38b3fffbf9e760093e31ac33e2d04625c74ed686f64689a8d676cc01ea2eb66a26dfed83f6805e78fb5c4c266

Malware Config

Extracted

Family

darkcomet

Botnet

lol

C2

176.59.45.252:1604

192.168.0.244:1604

Mutex

DC_MUTEX-P5CP790

Attributes
  • InstallPath

    xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx.exe

  • gencode

    AsjwcpH7UKJe

  • install

    true

  • offline_keylogger

    true

  • password

    546klcp8888

  • persistence

    false

  • reg_key

    MicroUpdate

Targets

    • Target

      3c3f94f0f39bf7b9cd68223c3b15adc75508e7bc8ffb5226798a7c65856decb7

    • Size

      659KB

    • MD5

      8bb3a68557f90f14dde0fbc58ff13f6a

    • SHA1

      77441c777a3e9ad810ee16b39281cc4b80cbd92a

    • SHA256

      3c3f94f0f39bf7b9cd68223c3b15adc75508e7bc8ffb5226798a7c65856decb7

    • SHA512

      4583e34ac4ea68f6e78a18eb515e027c46ae71b38b3fffbf9e760093e31ac33e2d04625c74ed686f64689a8d676cc01ea2eb66a26dfed83f6805e78fb5c4c266

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks