General

  • Target

    f75411df2ee719407f294a3319b4e72c65c963be17483c43b836c1e50a7dcb77

  • Size

    1.3MB

  • Sample

    221120-c3jersfh9t

  • MD5

    329c4fc0b42577cdeb4e30bf0f2b5409

  • SHA1

    8234447575f00fcd7f554cbb4bf1690c5c61e4df

  • SHA256

    f75411df2ee719407f294a3319b4e72c65c963be17483c43b836c1e50a7dcb77

  • SHA512

    a2aedb91954c7d554d399e5a13dea61879f3fb08f6f67baa69672fc5e45993df472a5e7af4714bed2e47a0912b2f1d1f32b03ace6a1fd8f0825bcf3252a88ff5

  • SSDEEP

    24576:ALmJkcoQricOIQxiZY1ia0Z9NKPS/JHkxMJFQ+5idVrJPZziW1VPobENDLcaLits:PJZoQrbTFZY1ia0Z3K4JHYTxJ9Xm45gI

Malware Config

Extracted

Family

darkcomet

Botnet

Vic

C2

84.240.10.41:7988

Mutex

DC_MUTEX-9S4LWHF

Attributes
  • InstallPath

    Micro\MicUpd.exe

  • gencode

    gTvQcbzWnFei

  • install

    true

  • offline_keylogger

    true

  • password

    matrix15

  • persistence

    false

  • reg_key

    MicroUpd

Targets

    • Target

      f75411df2ee719407f294a3319b4e72c65c963be17483c43b836c1e50a7dcb77

    • Size

      1.3MB

    • MD5

      329c4fc0b42577cdeb4e30bf0f2b5409

    • SHA1

      8234447575f00fcd7f554cbb4bf1690c5c61e4df

    • SHA256

      f75411df2ee719407f294a3319b4e72c65c963be17483c43b836c1e50a7dcb77

    • SHA512

      a2aedb91954c7d554d399e5a13dea61879f3fb08f6f67baa69672fc5e45993df472a5e7af4714bed2e47a0912b2f1d1f32b03ace6a1fd8f0825bcf3252a88ff5

    • SSDEEP

      24576:ALmJkcoQricOIQxiZY1ia0Z9NKPS/JHkxMJFQ+5idVrJPZziW1VPobENDLcaLits:PJZoQrbTFZY1ia0Z3K4JHYTxJ9Xm45gI

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks