General

  • Target

    3407d70d5b0555d86fffcaf0f500a455d94d2c0aa9ee4fdc5800df0375f18e45

  • Size

    528KB

  • Sample

    221001-3m252scbc8

  • MD5

    65eb70dfafe3c0c78109a442af7eae90

  • SHA1

    a4373ffff571a12ce7a88ff149da155b3b4087af

  • SHA256

    3407d70d5b0555d86fffcaf0f500a455d94d2c0aa9ee4fdc5800df0375f18e45

  • SHA512

    3a8cb9d7f8531080fa2f67f21efcd9c84e36d4e42363aac3255152bfb4b63bfa57ee9097a40b1ab5f0320acbfca7270a6c2452c554f517257f45e41af0bc1f9d

  • SSDEEP

    6144:gJ6hxh6edXLpKOseh6dDYcOzOohWoQb+RYWeWE3XvDMAIGubCjIFjqKoBoO:gCAUcO0OcOzOAuyRmDMFbOqjqKoBo

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

carlosjohn301.ddns.net:1604

Mutex

DC_MUTEX-ADH0PPW

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    qXwwGCGxgJlf

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

Targets

    • Target

      3407d70d5b0555d86fffcaf0f500a455d94d2c0aa9ee4fdc5800df0375f18e45

    • Size

      528KB

    • MD5

      65eb70dfafe3c0c78109a442af7eae90

    • SHA1

      a4373ffff571a12ce7a88ff149da155b3b4087af

    • SHA256

      3407d70d5b0555d86fffcaf0f500a455d94d2c0aa9ee4fdc5800df0375f18e45

    • SHA512

      3a8cb9d7f8531080fa2f67f21efcd9c84e36d4e42363aac3255152bfb4b63bfa57ee9097a40b1ab5f0320acbfca7270a6c2452c554f517257f45e41af0bc1f9d

    • SSDEEP

      6144:gJ6hxh6edXLpKOseh6dDYcOzOohWoQb+RYWeWE3XvDMAIGubCjIFjqKoBoO:gCAUcO0OcOzOAuyRmDMFbOqjqKoBo

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks