General

  • Target

    47edd481436b70c4845d42521ae6fcf01ece877ed4a472445a091282c9d9c661

  • Size

    283KB

  • Sample

    221011-x54hyabcd9

  • MD5

    10cfa9d58a011d0cf3f0c1f6fce41b00

  • SHA1

    0134dc99f55549b848be2a3e9512d76862bbf70d

  • SHA256

    47edd481436b70c4845d42521ae6fcf01ece877ed4a472445a091282c9d9c661

  • SHA512

    d02f7d7150a60ebe1f798c37099778d61f1a04dc6a56feb218f4a6dc87d6029662810a76d918f4075557c4618aa7b16dc81e4e0b015f3c9419d0e3e8f973e830

  • SSDEEP

    6144:XcNYk1yuwEDBum3qYWnl0pd0EX3Zq2b6wfIDYm0P7d:XcWkbgTYWnYnt/IDYhP7d

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

surindan.no-ip.info:1604

Mutex

DC_MUTEX-VL481JT

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    bmcJuvsPqDff

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    MicroUpdate

Targets

    • Target

      47edd481436b70c4845d42521ae6fcf01ece877ed4a472445a091282c9d9c661

    • Size

      283KB

    • MD5

      10cfa9d58a011d0cf3f0c1f6fce41b00

    • SHA1

      0134dc99f55549b848be2a3e9512d76862bbf70d

    • SHA256

      47edd481436b70c4845d42521ae6fcf01ece877ed4a472445a091282c9d9c661

    • SHA512

      d02f7d7150a60ebe1f798c37099778d61f1a04dc6a56feb218f4a6dc87d6029662810a76d918f4075557c4618aa7b16dc81e4e0b015f3c9419d0e3e8f973e830

    • SSDEEP

      6144:XcNYk1yuwEDBum3qYWnl0pd0EX3Zq2b6wfIDYm0P7d:XcWkbgTYWnYnt/IDYhP7d

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Modifies firewall policy service

    • Modifies security service

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Executes dropped EXE

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks