General

  • Target

    bb40056172a6e0a4d5c39fcfc445bb4450ae90e5bc085482a67ca0a02e0c6059

  • Size

    340KB

  • Sample

    221002-1tvnfadhdk

  • MD5

    651a7cc3a3b7d279929b20b7b3d6affd

  • SHA1

    db6607d408be3e1d25076725b1af8f048a79fc7a

  • SHA256

    bb40056172a6e0a4d5c39fcfc445bb4450ae90e5bc085482a67ca0a02e0c6059

  • SHA512

    df0e96ad98c7b5694907902c338f3d173806e6e1a41bbc0e3c1e5e387df1a67011f8d1f507ab52c87633f21ba7d7b466f80dfdd8b370cb07ec2729646667d83a

  • SSDEEP

    6144:TFhS9QH4pMojgpGGv1f93w9ost7jrWdl77dgJ7VHg4FTqjxeNBZqGB:vS9QH+Mo0GuK9ostDWdl75gHHrqABZqm

Malware Config

Extracted

Family

darkcomet

Botnet

facebook

C2

mentyy.zapto.org:81

Mutex

DC_MUTEX-RDAMRJ4

Attributes
  • InstallPath

    4a5hf489643fs3ar3f\lib_kt000201204upd.exe

  • gencode

    VWTn8UD7C2ZP

  • install

    true

  • offline_keylogger

    true

  • password

    1234

  • persistence

    true

  • reg_key

    winupd

Targets

    • Target

      bb40056172a6e0a4d5c39fcfc445bb4450ae90e5bc085482a67ca0a02e0c6059

    • Size

      340KB

    • MD5

      651a7cc3a3b7d279929b20b7b3d6affd

    • SHA1

      db6607d408be3e1d25076725b1af8f048a79fc7a

    • SHA256

      bb40056172a6e0a4d5c39fcfc445bb4450ae90e5bc085482a67ca0a02e0c6059

    • SHA512

      df0e96ad98c7b5694907902c338f3d173806e6e1a41bbc0e3c1e5e387df1a67011f8d1f507ab52c87633f21ba7d7b466f80dfdd8b370cb07ec2729646667d83a

    • SSDEEP

      6144:TFhS9QH4pMojgpGGv1f93w9ost7jrWdl77dgJ7VHg4FTqjxeNBZqGB:vS9QH+Mo0GuK9ostDWdl75gHHrqABZqm

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Executes dropped EXE

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks