General

  • Target

    00397ae0e8da20a2542f4478beb51efb5abf2806eca257ddd8da02e4fd2fa780

  • Size

    600KB

  • Sample

    220919-lafylsebgn

  • MD5

    744f7afc50e0e4dfa34d013183c315ef

  • SHA1

    73ad9e11ab3f2edf861663c7e33b261e6cd3364b

  • SHA256

    00397ae0e8da20a2542f4478beb51efb5abf2806eca257ddd8da02e4fd2fa780

  • SHA512

    4f41367d25dbd7c85a67dec890df25d0e078b85a302b863911da325f0889d018cf0665ae3bcc8827ce483ea1a51ba271935905cccc2b5d58189f63bb860c504c

  • SSDEEP

    12288:n2vt6Pp8TgrMDm5GwvBnx+EUGxWVfWRSlQvKeZBbjcg:n2lJgoDGGwvlx+EUGoShA

Malware Config

Extracted

Family

darkcomet

Botnet

PrivateEye

C2

sn0.no-ip.biz:2928

Mutex

DC_MUTEX-3S9C8EP

Attributes
  • InstallPath

    MSDCSCR\msdcscmain32.exe

  • gencode

    te3HHGAMCDaF

  • install

    true

  • offline_keylogger

    false

  • persistence

    true

  • reg_key

    rundll32

Targets

    • Target

      00397ae0e8da20a2542f4478beb51efb5abf2806eca257ddd8da02e4fd2fa780

    • Size

      600KB

    • MD5

      744f7afc50e0e4dfa34d013183c315ef

    • SHA1

      73ad9e11ab3f2edf861663c7e33b261e6cd3364b

    • SHA256

      00397ae0e8da20a2542f4478beb51efb5abf2806eca257ddd8da02e4fd2fa780

    • SHA512

      4f41367d25dbd7c85a67dec890df25d0e078b85a302b863911da325f0889d018cf0665ae3bcc8827ce483ea1a51ba271935905cccc2b5d58189f63bb860c504c

    • SSDEEP

      12288:n2vt6Pp8TgrMDm5GwvBnx+EUGxWVfWRSlQvKeZBbjcg:n2lJgoDGGwvlx+EUGoShA

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks