General

  • Target

    d615c2abea3b04bda1e19238670dd4487e38846ec04bf47c01ed7053b3d17a5f

  • Size

    800KB

  • Sample

    221020-z1sxraegbj

  • MD5

    962b6297bfe02e597197fc3d104558f0

  • SHA1

    1cf73f2d2e62f6076466bc8dbeed93aaa44643ca

  • SHA256

    d615c2abea3b04bda1e19238670dd4487e38846ec04bf47c01ed7053b3d17a5f

  • SHA512

    85d663827c02c509705e2a689bf520fdd0b82d68e2f3e9cf0fe9b1b239425685c37636ce9fc74412630b668dc80fba8a1c13dc7bbaec40af0bc90aade95616fb

  • SSDEEP

    12288:qS1hFDxZFbhf3T/aBkuqyGunESWdXYwPaF4dDenvKv+Ie:1FPH7YkTvSWN5PI4M9I

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

185.84.181.81:100

Mutex

DC_MUTEX-0DKXA0V

Attributes
  • gencode

    M5VVBQQEtzRs

  • install

    false

  • offline_keylogger

    true

  • persistence

    false

Extracted

Family

pony

C2

http://lynch.herobo.com/pcss/gate.php

Targets

    • Target

      d615c2abea3b04bda1e19238670dd4487e38846ec04bf47c01ed7053b3d17a5f

    • Size

      800KB

    • MD5

      962b6297bfe02e597197fc3d104558f0

    • SHA1

      1cf73f2d2e62f6076466bc8dbeed93aaa44643ca

    • SHA256

      d615c2abea3b04bda1e19238670dd4487e38846ec04bf47c01ed7053b3d17a5f

    • SHA512

      85d663827c02c509705e2a689bf520fdd0b82d68e2f3e9cf0fe9b1b239425685c37636ce9fc74412630b668dc80fba8a1c13dc7bbaec40af0bc90aade95616fb

    • SSDEEP

      12288:qS1hFDxZFbhf3T/aBkuqyGunESWdXYwPaF4dDenvKv+Ie:1FPH7YkTvSWN5PI4M9I

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks