General

  • Target

    2a3a10424ea8dfd88e082fe0fc7f80bafce86148f6dac2a27ea12297f2350343

  • Size

    730KB

  • Sample

    220919-dg573sddg4

  • MD5

    2ece81f82bb6057bf29952e01edf32ca

  • SHA1

    7ec4f15db048eb3fec42f07e9d816a5a03a95ed7

  • SHA256

    2a3a10424ea8dfd88e082fe0fc7f80bafce86148f6dac2a27ea12297f2350343

  • SHA512

    4f83accfcf1061a56887f011be12017ebe7487f6f30ae0fa69ca1942228de7059561f92d0c1a1ed43f50081dee705f8edb66935cf438a6a861a725abd69cd338

  • SSDEEP

    12288:EgOFjK5KBiuTDv5ntEYe4AAm+FaulESue6cIC2NLo3eBT7rtM:EDZK5Ksg5Oux5qSvJIfLge17rtM

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

sven.no-ip.biz:1996

Mutex

DC_MUTEX-Y2RMNMN

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    XTYWaLKWXNj3

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

Targets

    • Target

      2a3a10424ea8dfd88e082fe0fc7f80bafce86148f6dac2a27ea12297f2350343

    • Size

      730KB

    • MD5

      2ece81f82bb6057bf29952e01edf32ca

    • SHA1

      7ec4f15db048eb3fec42f07e9d816a5a03a95ed7

    • SHA256

      2a3a10424ea8dfd88e082fe0fc7f80bafce86148f6dac2a27ea12297f2350343

    • SHA512

      4f83accfcf1061a56887f011be12017ebe7487f6f30ae0fa69ca1942228de7059561f92d0c1a1ed43f50081dee705f8edb66935cf438a6a861a725abd69cd338

    • SSDEEP

      12288:EgOFjK5KBiuTDv5ntEYe4AAm+FaulESue6cIC2NLo3eBT7rtM:EDZK5Ksg5Oux5qSvJIfLge17rtM

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Executes dropped EXE

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Hidden Files and Directories

2
T1158

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Hidden Files and Directories

2
T1158

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Remote System Discovery

1
T1018

Tasks