General

  • Target

    e20fd2d4ca80b42d74cdfc6e85b8648e68629165297dcf56c7a8a03b415480ee

  • Size

    660KB

  • Sample

    221011-lap7aafhfk

  • MD5

    61a54fa41c4280be5a6ceb0ef679e540

  • SHA1

    fbefd2534d1cba3346752af2d03713be0b98bb91

  • SHA256

    e20fd2d4ca80b42d74cdfc6e85b8648e68629165297dcf56c7a8a03b415480ee

  • SHA512

    953cb45e72567b1f51a9c639b7edceeee5e4a440ba293c4bc5f0c3bef2b597727ed2fb9b8f8e11abbf1421c18c93730645ca07b6b52404bfb63087fb754565d7

  • SSDEEP

    12288:MXhpvNWw276S/DuoeFcfbmiJ99VPhYR5MTSHvLenELrWv1lZw4JuMkMh/fy452Uy:anAw2WWeFcfbP9VPSPMTSPL/rWvzq4Ji

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

testingr.zapto.org:8086

Mutex

DC_MUTEX-ZBUEMCL

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    Y1NE1FDAhmwN

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

Targets

    • Target

      e20fd2d4ca80b42d74cdfc6e85b8648e68629165297dcf56c7a8a03b415480ee

    • Size

      660KB

    • MD5

      61a54fa41c4280be5a6ceb0ef679e540

    • SHA1

      fbefd2534d1cba3346752af2d03713be0b98bb91

    • SHA256

      e20fd2d4ca80b42d74cdfc6e85b8648e68629165297dcf56c7a8a03b415480ee

    • SHA512

      953cb45e72567b1f51a9c639b7edceeee5e4a440ba293c4bc5f0c3bef2b597727ed2fb9b8f8e11abbf1421c18c93730645ca07b6b52404bfb63087fb754565d7

    • SSDEEP

      12288:MXhpvNWw276S/DuoeFcfbmiJ99VPhYR5MTSHvLenELrWv1lZw4JuMkMh/fy452Uy:anAw2WWeFcfbP9VPSPMTSPL/rWvzq4Ji

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Executes dropped EXE

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks