General

  • Target

    0ed85fa7d62a79306a7e52a321de3d1880afd9ef5ba376569f528e7f52047f25

  • Size

    2.7MB

  • Sample

    221123-l21gbsgc4t

  • MD5

    84bf54351957e900ffed47bec794bad7

  • SHA1

    99c2985eec7c242cc0b574138af08ae2f2d9c0ac

  • SHA256

    0ed85fa7d62a79306a7e52a321de3d1880afd9ef5ba376569f528e7f52047f25

  • SHA512

    aafcfb2c36eb42b5e52d26c88a4e004bb89a1127a04714c245bdd09ad49d22f3bcfdbaf42aeed4d9932646e39422d66605149e858a4f35c9e8f59270e6751ba2

  • SSDEEP

    49152:bkwkn9IMHeae6S5VuaVP1L3TQ/8hdROmzdL0zy4tEwdHO5BIPbSj+XC2Qg9aPCS:IdnV5MVuQt7TQEh7OmJxw0MPWj+XC2FL

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16_min

C2

verydark25.no-ip.biz:100

Mutex

DCMIN_MUTEX-QPZZXFD

Attributes
  • InstallPath

    DCSCMIN\IMDCSC.exe

  • gencode

    0GZSgZY5XLqM

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    Chrome Updater

Targets

    • Target

      0ed85fa7d62a79306a7e52a321de3d1880afd9ef5ba376569f528e7f52047f25

    • Size

      2.7MB

    • MD5

      84bf54351957e900ffed47bec794bad7

    • SHA1

      99c2985eec7c242cc0b574138af08ae2f2d9c0ac

    • SHA256

      0ed85fa7d62a79306a7e52a321de3d1880afd9ef5ba376569f528e7f52047f25

    • SHA512

      aafcfb2c36eb42b5e52d26c88a4e004bb89a1127a04714c245bdd09ad49d22f3bcfdbaf42aeed4d9932646e39422d66605149e858a4f35c9e8f59270e6751ba2

    • SSDEEP

      49152:bkwkn9IMHeae6S5VuaVP1L3TQ/8hdROmzdL0zy4tEwdHO5BIPbSj+XC2Qg9aPCS:IdnV5MVuQt7TQEh7OmJxw0MPWj+XC2FL

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks