General

  • Target

    32b7afcb5c386847d67df435dd1ee685d7afa39bc0fac4437f054c5546af25dd

  • Size

    394KB

  • Sample

    221011-yk1f8abhhm

  • MD5

    83b9c0ccfc41bcf9900d13d3de74ba3b

  • SHA1

    d2dddf0c6c5e6ce45f3ebf3d89826ed64fdab610

  • SHA256

    32b7afcb5c386847d67df435dd1ee685d7afa39bc0fac4437f054c5546af25dd

  • SHA512

    2181189443bda3126c4e2335d355454eee3c9576292fd9485dc75839c04cf64dc0f13c58db52f202f513d5ff342c688ca1b44f013db66d68423d22b0b5caa139

  • SSDEEP

    6144:gMU81mKGzOr2+krxLCPy95PNbyIn+dmge0qOxS+NfMA90ZnMaN/j:gMdmKWOa+wxWPiPNbDfCS+FMA90ZnD/

Malware Config

Extracted

Family

darkcomet

Botnet

Day1

C2

epicdust.servecounterstrike.com:1604

Mutex

DC_MUTEX-FE50JVD

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    85dtHfaBqD8E

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    MicroUpdate

Targets

    • Target

      32b7afcb5c386847d67df435dd1ee685d7afa39bc0fac4437f054c5546af25dd

    • Size

      394KB

    • MD5

      83b9c0ccfc41bcf9900d13d3de74ba3b

    • SHA1

      d2dddf0c6c5e6ce45f3ebf3d89826ed64fdab610

    • SHA256

      32b7afcb5c386847d67df435dd1ee685d7afa39bc0fac4437f054c5546af25dd

    • SHA512

      2181189443bda3126c4e2335d355454eee3c9576292fd9485dc75839c04cf64dc0f13c58db52f202f513d5ff342c688ca1b44f013db66d68423d22b0b5caa139

    • SSDEEP

      6144:gMU81mKGzOr2+krxLCPy95PNbyIn+dmge0qOxS+NfMA90ZnMaN/j:gMdmKWOa+wxWPiPNbDfCS+FMA90ZnD/

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks