General

  • Target

    1f74027f7792e95b1be337dc1a7d268a546c9b1feb2170347add8c3fb31c3783

  • Size

    713KB

  • Sample

    221030-s1k4ksgch7

  • MD5

    81d0c19275bf776c9a9c50fc8dd0db35

  • SHA1

    93495d5ffa9960bd1ff3298e3e454b6e96015ecc

  • SHA256

    1f74027f7792e95b1be337dc1a7d268a546c9b1feb2170347add8c3fb31c3783

  • SHA512

    0ff3a7b3e0fd92d37031fc16ee6834845aac9a581f631b2a7a0836581c9db96c05b95074cd09b19d8d89f04d920cbddbff4ae66b091e2c820d73e061dc159000

  • SSDEEP

    12288:RNfKLBRkfgWYGPKhyhcJrqFSWdNoKfeZ8EJa+Ez2WBtzM307xFD+4T/PcNXEsVuN:RtKLBRkYWzihjJGV7ffeZ8Ec91BtIx+/

Malware Config

Extracted

Family

darkcomet

Botnet

FRANK-HACK

C2

darcom546.no-ip.org:1604

Mutex

DC_MUTEX-384LALT

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    R3268dJXpjAD

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

Targets

    • Target

      1f74027f7792e95b1be337dc1a7d268a546c9b1feb2170347add8c3fb31c3783

    • Size

      713KB

    • MD5

      81d0c19275bf776c9a9c50fc8dd0db35

    • SHA1

      93495d5ffa9960bd1ff3298e3e454b6e96015ecc

    • SHA256

      1f74027f7792e95b1be337dc1a7d268a546c9b1feb2170347add8c3fb31c3783

    • SHA512

      0ff3a7b3e0fd92d37031fc16ee6834845aac9a581f631b2a7a0836581c9db96c05b95074cd09b19d8d89f04d920cbddbff4ae66b091e2c820d73e061dc159000

    • SSDEEP

      12288:RNfKLBRkfgWYGPKhyhcJrqFSWdNoKfeZ8EJa+Ez2WBtzM307xFD+4T/PcNXEsVuN:RtKLBRkYWzihjJGV7ffeZ8Ec91BtIx+/

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks