General

  • Target

    a4d929f841b8c0ad8bdee2f2bd140193016352e4c46f5d8b4731c9703fdd2f71

  • Size

    673KB

  • Sample

    221020-1py53agbb7

  • MD5

    a02f714012eb9681c2f45a162e57759a

  • SHA1

    828aa6e08014125a66d0decd0c79760ebc90c2dc

  • SHA256

    a4d929f841b8c0ad8bdee2f2bd140193016352e4c46f5d8b4731c9703fdd2f71

  • SHA512

    b1d963eb35c799a70638ccbab7a8a6d3ca7d47218882b980ef5002dbef32ad6fa0cf88128bdbb9bbe4a76316f33e032cf3c9414998020fecba4a6bc192ef46f9

  • SSDEEP

    12288:09HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/hlu:4Z1xuVVjfFoynPaVBUR8f+kN10EB2

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

thewirartravels.no-ip.org:1604

Mutex

DC_MUTEX-DS3KZHJ

Attributes
  • InstallPath

    MSDCSC\toolbar.bat

  • gencode

    7D7yZb80ttsb

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

Targets

    • Target

      a4d929f841b8c0ad8bdee2f2bd140193016352e4c46f5d8b4731c9703fdd2f71

    • Size

      673KB

    • MD5

      a02f714012eb9681c2f45a162e57759a

    • SHA1

      828aa6e08014125a66d0decd0c79760ebc90c2dc

    • SHA256

      a4d929f841b8c0ad8bdee2f2bd140193016352e4c46f5d8b4731c9703fdd2f71

    • SHA512

      b1d963eb35c799a70638ccbab7a8a6d3ca7d47218882b980ef5002dbef32ad6fa0cf88128bdbb9bbe4a76316f33e032cf3c9414998020fecba4a6bc192ef46f9

    • SSDEEP

      12288:09HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/hlu:4Z1xuVVjfFoynPaVBUR8f+kN10EB2

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Disables RegEdit via registry modification

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks