General

  • Target

    37fdcfd7d3d1b550bc90116c1b11ffadee6ef30ad6cf221d7347c3822f52ca72

  • Size

    252KB

  • Sample

    221020-bhsl9sgad9

  • MD5

    a243180b33c2882019b2e3a1e23337b0

  • SHA1

    ab5536347e5bcc31bb450b133089b76fb00b93f6

  • SHA256

    37fdcfd7d3d1b550bc90116c1b11ffadee6ef30ad6cf221d7347c3822f52ca72

  • SHA512

    775aeff15e91eb418b3a7d7a2489f39a730b43a115bbe7f95e97c209504a09524e207d58c8082445d11bf033c56fd29cdde7d954ad35efaadb39cca5d6b1fe22

  • SSDEEP

    6144:/cNYS996KFifeVjBpeExgVTFSXFoMc5RhCaL37KA:/cW7KEZlPzCy37L

Malware Config

Extracted

Family

darkcomet

Botnet

Anonymous

C2

thaiduong.ddns.net:80

thaiduong.ddns.net:81

thaiduong.ddns.net:88

thaiduong.ddns.net:99

parker8888.ddns.net:80

parker8888.ddns.net:81

parker8888.ddns.net:88

parker8888.ddns.net:99

anonymous8888.ddns.net:80

anonymous8888.ddns.net:81

anonymous8888.ddns.net:88

anonymous8888.ddns.net:99

Mutex

DC_MUTEX-GFY57DB

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    lWRxBdsCyvwt

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

Targets

    • Target

      37fdcfd7d3d1b550bc90116c1b11ffadee6ef30ad6cf221d7347c3822f52ca72

    • Size

      252KB

    • MD5

      a243180b33c2882019b2e3a1e23337b0

    • SHA1

      ab5536347e5bcc31bb450b133089b76fb00b93f6

    • SHA256

      37fdcfd7d3d1b550bc90116c1b11ffadee6ef30ad6cf221d7347c3822f52ca72

    • SHA512

      775aeff15e91eb418b3a7d7a2489f39a730b43a115bbe7f95e97c209504a09524e207d58c8082445d11bf033c56fd29cdde7d954ad35efaadb39cca5d6b1fe22

    • SSDEEP

      6144:/cNYS996KFifeVjBpeExgVTFSXFoMc5RhCaL37KA:/cW7KEZlPzCy37L

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Modifies firewall policy service

    • Modifies security service

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Executes dropped EXE

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks