General

  • Target

    e9ff6f4a20f8f503790936f5a6601d523b0543284d763dedf8525ea5f3ed8e21

  • Size

    555KB

  • Sample

    221108-zv6xesaebl

  • MD5

    0eb34141a4641bfed8aad9ff39e769c0

  • SHA1

    1db95c652b573a812c54f0d43fee28817d001652

  • SHA256

    e9ff6f4a20f8f503790936f5a6601d523b0543284d763dedf8525ea5f3ed8e21

  • SHA512

    561aa2635ff79bb88724b38a195faaadb346c5ee4e6bee5f46d7e1bccc511b03edf58885478fd4aa7d8ca0c1f16db15d081440e14cdc70f209d4f1093cc2ad60

  • SSDEEP

    12288:cgztz6C2jce9DKy4bi1De6wW2gIbJl0ekRzO0FzJAdq:F96zRl+d7luVKmUq

Malware Config

Extracted

Family

darkcomet

Botnet

Victime

C2

taraji19.no-ip.org:81

Mutex

DC_MUTEX-PJKYUUB

Attributes
  • gencode

    7uBzBgo1DC3L

  • install

    false

  • offline_keylogger

    true

  • persistence

    false

Targets

    • Target

      e9ff6f4a20f8f503790936f5a6601d523b0543284d763dedf8525ea5f3ed8e21

    • Size

      555KB

    • MD5

      0eb34141a4641bfed8aad9ff39e769c0

    • SHA1

      1db95c652b573a812c54f0d43fee28817d001652

    • SHA256

      e9ff6f4a20f8f503790936f5a6601d523b0543284d763dedf8525ea5f3ed8e21

    • SHA512

      561aa2635ff79bb88724b38a195faaadb346c5ee4e6bee5f46d7e1bccc511b03edf58885478fd4aa7d8ca0c1f16db15d081440e14cdc70f209d4f1093cc2ad60

    • SSDEEP

      12288:cgztz6C2jce9DKy4bi1De6wW2gIbJl0ekRzO0FzJAdq:F96zRl+d7luVKmUq

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies firewall policy service

    • Modifies security service

    • Windows security bypass

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

2
T1031

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

1
T1089

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks