General

  • Target

    e0b7f0deec2d5670fb322e5614394368880516ad2de6a87cf5c01a2706487606

  • Size

    544KB

  • Sample

    221029-1qy7fshdbj

  • MD5

    849b51fdc0a910ab9ccf23c999dfaa64

  • SHA1

    6e293b8bafd860d54bd0e49c631fc78ef139ebc4

  • SHA256

    e0b7f0deec2d5670fb322e5614394368880516ad2de6a87cf5c01a2706487606

  • SHA512

    3cf460f265fccf1f8f1a5c26556bc99285050b250b2dee771a07c0625f1079a08e302e3c48b96c26e58b1d0d2e9bb814d19488af5f8dc8a95d6317b65ad9050e

  • SSDEEP

    12288:QiShEbFEGI58aLqN5YRNnZd6lQghXJuUzFbPH6UksKN0fZ3:nSiktLqGdYFTv

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

188.102.22.94:1604

Mutex

DC_MUTEX-GAQJQ34

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    s7uW6TWCpQcL

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    MicroUpdate

Targets

    • Target

      e0b7f0deec2d5670fb322e5614394368880516ad2de6a87cf5c01a2706487606

    • Size

      544KB

    • MD5

      849b51fdc0a910ab9ccf23c999dfaa64

    • SHA1

      6e293b8bafd860d54bd0e49c631fc78ef139ebc4

    • SHA256

      e0b7f0deec2d5670fb322e5614394368880516ad2de6a87cf5c01a2706487606

    • SHA512

      3cf460f265fccf1f8f1a5c26556bc99285050b250b2dee771a07c0625f1079a08e302e3c48b96c26e58b1d0d2e9bb814d19488af5f8dc8a95d6317b65ad9050e

    • SSDEEP

      12288:QiShEbFEGI58aLqN5YRNnZd6lQghXJuUzFbPH6UksKN0fZ3:nSiktLqGdYFTv

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks