General

  • Target

    3ddae1610ee3b0d26a9fe533184ff3e9139600318cd2f15d8d4e5bffbc626aad

  • Size

    2.2MB

  • Sample

    221121-2r8b7aad27

  • MD5

    6f2e7f922d910aa5bfbecd599840db61

  • SHA1

    fba2bb7ea13174169eb5c1e5f0fedab0af1f6837

  • SHA256

    3ddae1610ee3b0d26a9fe533184ff3e9139600318cd2f15d8d4e5bffbc626aad

  • SHA512

    584537a4c03aaf28da07f57ea6610471e3007ad226e4bb76b53ffe986f0f31b96be83ef5b8a8bc4134ed0d2af7a22f648899d176d4f0ace9b48e077dbea5d2fa

  • SSDEEP

    49152:Ykwkn9IMHeaCgRYJFTGYPyutFs+sLTDLNIoaPCS:jdnVSJFiuk+sLTF2PC

Malware Config

Extracted

Family

darkcomet

Botnet

Guesttest

C2

hottstuff.ddns.net:200

Mutex

DC_MUTEX-MM87GQX

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    DD1cXi5kpA3j

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    rundll32

Targets

    • Target

      3ddae1610ee3b0d26a9fe533184ff3e9139600318cd2f15d8d4e5bffbc626aad

    • Size

      2.2MB

    • MD5

      6f2e7f922d910aa5bfbecd599840db61

    • SHA1

      fba2bb7ea13174169eb5c1e5f0fedab0af1f6837

    • SHA256

      3ddae1610ee3b0d26a9fe533184ff3e9139600318cd2f15d8d4e5bffbc626aad

    • SHA512

      584537a4c03aaf28da07f57ea6610471e3007ad226e4bb76b53ffe986f0f31b96be83ef5b8a8bc4134ed0d2af7a22f648899d176d4f0ace9b48e077dbea5d2fa

    • SSDEEP

      49152:Ykwkn9IMHeaCgRYJFTGYPyutFs+sLTDLNIoaPCS:jdnVSJFiuk+sLTF2PC

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Executes dropped EXE

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks