General

  • Target

    7a8dad742401623928d542cdea3b01537a41d6d39b0dd25057e1d70fdf55c3e5

  • Size

    348KB

  • Sample

    221030-vw2lwabeh8

  • MD5

    8315a21cdfdc88c3b9b4fdaf2d4f2030

  • SHA1

    c92828e2d3dbaf2843088ce86b7296ca72d5d86f

  • SHA256

    7a8dad742401623928d542cdea3b01537a41d6d39b0dd25057e1d70fdf55c3e5

  • SHA512

    9db22c6a8fc369d5c9a401fa6ccb81667f84110283e6a403cc186f456526d4a7b28657ea2feb6e0bd4dc2539128c2b08bb60872106aca48fca8756f003a9ba3c

  • SSDEEP

    6144:mqLzGyzpKalLBQmByWWwf/vNsr9Rpef3jPrkIqn9dwbmIdsculFmQRMoZVK4Si:NphltQT29S9Rpe7Prk9PiFwFmQ9G4S

Malware Config

Extracted

Family

darkcomet

Botnet

Kermoot

C2

kermootseven.no-ip.biz:1604

Mutex

DC_MUTEX-R2MRZT9

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    EkKq5HcgPaSa

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    MicroUpdate777

Targets

    • Target

      7a8dad742401623928d542cdea3b01537a41d6d39b0dd25057e1d70fdf55c3e5

    • Size

      348KB

    • MD5

      8315a21cdfdc88c3b9b4fdaf2d4f2030

    • SHA1

      c92828e2d3dbaf2843088ce86b7296ca72d5d86f

    • SHA256

      7a8dad742401623928d542cdea3b01537a41d6d39b0dd25057e1d70fdf55c3e5

    • SHA512

      9db22c6a8fc369d5c9a401fa6ccb81667f84110283e6a403cc186f456526d4a7b28657ea2feb6e0bd4dc2539128c2b08bb60872106aca48fca8756f003a9ba3c

    • SSDEEP

      6144:mqLzGyzpKalLBQmByWWwf/vNsr9Rpef3jPrkIqn9dwbmIdsculFmQRMoZVK4Si:NphltQT29S9Rpe7Prk9PiFwFmQ9G4S

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks