General

  • Target

    f10ebeb6578aaab15d9a6eb94de2275761236699368fa93e52f85264954950b6

  • Size

    736KB

  • Sample

    221123-pywkrace84

  • MD5

    b9c45d0a273155427b7e8a62cf078f98

  • SHA1

    6963c693c509fa77cb7c30b73f354abb16b76280

  • SHA256

    f10ebeb6578aaab15d9a6eb94de2275761236699368fa93e52f85264954950b6

  • SHA512

    ce344702ad071b93d3c2ef62bfd0c2d7f52f7c2a3a03ca08d48602bb732ebe713ebe699bc204690c3f714c83baf9c12103fed9dedeb4c1816fe672a2699ed3bc

  • SSDEEP

    12288:q/fOk8VleKE+9HAHrsRfaRLOr0Oa+6QXRkppQQiS:sOllCgFmLO4W6QhkU

Malware Config

Extracted

Family

darkcomet

Botnet

Abd_kca

C2

haxexploit.no-ip.biz:443

Mutex

DCMIN_MUTEX-SK7VXA9

Attributes
  • InstallPath

    DCSCMIN\IMDCSC.exe

  • gencode

    XsyrH3n3kub1

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    DarkComet RAT

Targets

    • Target

      f10ebeb6578aaab15d9a6eb94de2275761236699368fa93e52f85264954950b6

    • Size

      736KB

    • MD5

      b9c45d0a273155427b7e8a62cf078f98

    • SHA1

      6963c693c509fa77cb7c30b73f354abb16b76280

    • SHA256

      f10ebeb6578aaab15d9a6eb94de2275761236699368fa93e52f85264954950b6

    • SHA512

      ce344702ad071b93d3c2ef62bfd0c2d7f52f7c2a3a03ca08d48602bb732ebe713ebe699bc204690c3f714c83baf9c12103fed9dedeb4c1816fe672a2699ed3bc

    • SSDEEP

      12288:q/fOk8VleKE+9HAHrsRfaRLOr0Oa+6QXRkppQQiS:sOllCgFmLO4W6QhkU

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks