General

  • Target

    60040b6228aec0439d42fa0cea6347ac41626a2750b532dd0e01d6b88e0a4554

  • Size

    309KB

  • Sample

    221108-y92qksfgd3

  • MD5

    098c182508b120ea5aecb3bfe0a40c70

  • SHA1

    a09b9ce8b8712cf5277213d18246cd9c0947bef9

  • SHA256

    60040b6228aec0439d42fa0cea6347ac41626a2750b532dd0e01d6b88e0a4554

  • SHA512

    c1a61730d4579e2556731fabb3e2096e3eb6f68c1d66f54f45fc903a279becb5e470f9346689a1cd79751b12a652b59dde579b00758f8b3e8d4e84ca84f51829

  • SSDEEP

    6144:0ONclWWRnUh8i2sgUUJ5p9+RUkARNTO5sNjOkK7rV8L7ilH5:3/CiNmp9+RUrLO5sxK7R8KlZ

Malware Config

Extracted

Family

darkcomet

Botnet

HF

C2

woxpaska.no-ip.org:1604

Mutex

DC_MUTEX-RZ3HY47

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    2BAgScd4816q

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

Targets

    • Target

      60040b6228aec0439d42fa0cea6347ac41626a2750b532dd0e01d6b88e0a4554

    • Size

      309KB

    • MD5

      098c182508b120ea5aecb3bfe0a40c70

    • SHA1

      a09b9ce8b8712cf5277213d18246cd9c0947bef9

    • SHA256

      60040b6228aec0439d42fa0cea6347ac41626a2750b532dd0e01d6b88e0a4554

    • SHA512

      c1a61730d4579e2556731fabb3e2096e3eb6f68c1d66f54f45fc903a279becb5e470f9346689a1cd79751b12a652b59dde579b00758f8b3e8d4e84ca84f51829

    • SSDEEP

      6144:0ONclWWRnUh8i2sgUUJ5p9+RUkARNTO5sNjOkK7rV8L7ilH5:3/CiNmp9+RUrLO5sxK7R8KlZ

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Modifies WinLogon for persistence

    • ModiLoader Second Stage

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks