General

  • Target

    a0c68d73c01a70d1ed9b984d7a92d7a33d2b6b76fb48774137443c538b9a1035

  • Size

    1022KB

  • Sample

    221011-hw6jlsbfaq

  • MD5

    71aa732bc440747865b80aa4ae6b7964

  • SHA1

    3fcee2da11b8c942ba2029f074e3452ca74d5d47

  • SHA256

    a0c68d73c01a70d1ed9b984d7a92d7a33d2b6b76fb48774137443c538b9a1035

  • SHA512

    58ca1d67623fa73dec810467a22842c6c761f843b6eae7d1da27b060db1c39b919bc98284ff2d94602aa4a8a929cff2d3126d82acd1d2464ecdd7e2674c8e6b8

  • SSDEEP

    24576:6vOTggIRfmQX3zRYC6FVZPv+FWe4Ys/EWc:KjYlDZ3+UT/EW

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

86.19.152.61:1604

Mutex

DC_MUTEX-3SXRNQA

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    25DXBoo5LzAj

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

Targets

    • Target

      a0c68d73c01a70d1ed9b984d7a92d7a33d2b6b76fb48774137443c538b9a1035

    • Size

      1022KB

    • MD5

      71aa732bc440747865b80aa4ae6b7964

    • SHA1

      3fcee2da11b8c942ba2029f074e3452ca74d5d47

    • SHA256

      a0c68d73c01a70d1ed9b984d7a92d7a33d2b6b76fb48774137443c538b9a1035

    • SHA512

      58ca1d67623fa73dec810467a22842c6c761f843b6eae7d1da27b060db1c39b919bc98284ff2d94602aa4a8a929cff2d3126d82acd1d2464ecdd7e2674c8e6b8

    • SSDEEP

      24576:6vOTggIRfmQX3zRYC6FVZPv+FWe4Ys/EWc:KjYlDZ3+UT/EW

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Executes dropped EXE

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks